Skip to content

How to Configure the BeyondTrust Integration

Purpose and Benefits

Integrating Hydden with BeyondTrust creates a unified privileged access management solution that combines identity discovery, threat detection, and access governance with BeyondTrust's powerful access control capabilities. This integration enables organizations to:

  • Achieve Complete Privileged Account Visibility: Discover all user accounts, service accounts, and groups with BeyondTrust access, creating a comprehensive inventory of privileged identities and enabling accurate account ownership assignment.
  • Enable Cohesive Access Governance: View discovered BeyondTrust accounts and access patterns within Hydden's identity intelligence platform, supporting unified access reviews and compliance audits across privileged and non-privileged accounts.
  • Support PAM Integration Workflows: Leverage Hydden's threat detection and classification to identify high-risk accounts, then trigger automated workflows to move discovered credentials into BeyondTrust vaults for enhanced protection.
  • Enforce Least Privilege Across the Organization: Use Hydden's identity mapping and threat intelligence to identify accounts with excessive BeyondTrust access, supporting ongoing compliance and security hardening efforts.
  • Enable Integrated Compliance Reporting: Combine Hydden's account discovery and threat detection with BeyondTrust privileged access audit data, enabling comprehensive compliance reporting and incident investigation.

Data Collector

The following procedural outline provides the main steps on how to configure the BeyondTrust Integration for use with Hydden.

The BeyondTrust Collector discovers BeyondTrust User Accounts and Groups. For those discovered entities, it discovers details, like MFA status (enabled/disabled), login data, etc. The collector has visibility into users accounts that have access to the SaaS platform.

  1. Configure the BeyondTrust Data Collector on Hydden. Refer to BeyondTrust collector module.
  2. Create a Data Source for the BeyondTrust Data Collector on Hydden. Refer to How to Configure a BeyondTrust Data Source.
  3. View the collected data. Refer to How to view the BeyondTrust Data

Hydden Documentation and Training Hub