ProficientNowTechRFCs

RFC-PAM-0001: Privileged Access Management Architecture

RFC-PAM-0001                                                      Index
Category: Standards Track                     Privileged Access Management

RFC-PAM-0001: Privileged Access Management Architecture

Index


RFC Metadata

FieldValue
RFC IDRFC-PAM-0001
TitlePrivileged Access Management Architecture
KindArchitecture
StatusDraft
CategoryStandards Track
AuthorPlatform Engineering
Created2026-02-10
Last Updated2026-02-10
Version1.0.0

Abstract

This RFC defines the architecture for privileged access management (PAM) governing human access to infrastructure resources including SSH servers, databases, and Kubernetes clusters. It positions Teleport as the centralized access broker, integrating with Keycloak for identity (per RFC-IAM-0001) and Vault for credential management (per RFC-SECOPS-0001).

The architecture enforces a zero direct access model where all privileged sessions flow through Teleport with mandatory session recording, certificate-based authentication, and just-in-time access workflows. This eliminates standing credentials, provides comprehensive audit trails, and enables fine-grained access control based on the authorization ceiling established by Azure AD group memberships.

Scope Boundaries

In ScopeOut of Scope
SSH access to Linux/Unix serversWeb UI SSO (RFC-IAM-0001)
Database client sessions (psql, mysql, mongosh)Service-to-service authentication (RFC-WORKLOAD-IDENTITY)
Kubernetes exec/attach/port-forwardSecret storage and rotation mechanics (RFC-SECOPS-0001)
Windows RDP accessNetwork-level security policies (RFC-TENANT-SECURITY)
Session recording and playbackSelf-service UI workflows (RFC-DEVELOPER-PLATFORM)
Just-in-time access requestsCI/CD pipeline credentials
Command and query auditingAPI token management for services

This RFC addresses interactive human users accessing infrastructure—not automated workloads, web applications, or machine identity.

Primary Question

"Can this human access this infrastructure resource?"

Relationship to Other RFCs

This RFC is part of a family of platform architecture specifications:

RFCDomainRelationship to RFC-PAM-0001
RFC-IAM-0001Web UI AuthProvides identity layer (Keycloak SSO)
RFC-SECOPS-0001Secrets ManagementProvides credential authority (Vault SSH/DB engines)
RFC-WORKLOAD-IDENTITY (planned)Workload IdentityParallel RFC for machine-to-machine access
RFC-DEVELOPER-PLATFORM (planned)Developer PortalProvides self-service access request UI
RFC-TENANT-SECURITY (planned)Application SecurityComplementary network-level controls

Normative Dependencies:

  • RFC-IAM-0001 is normative for identity concerns—RFC-PAM-0001 MUST authenticate users through Keycloak
  • RFC-SECOPS-0001 is normative for credential concerns—RFC-PAM-0001 MUST use Vault for SSH certificates and database credentials

Table of Contents

Core Sections

  1. Introduction

    • 1.1 Background and Context
    • 1.2 Current State Analysis
    • 1.3 The Problem with Traditional Access
    • 1.4 Motivation for This Architecture
  2. Requirements

    • 2.1 Problem Restatement
    • 2.2 Design Goals
    • 2.3 Non-Goals
    • 2.4 Architectural Invariants
    • 2.5 Success Criteria
  3. Architecture

    • 3.1 System Overview
    • 3.2 Zero Direct Access Model
    • 3.3 Trust Hierarchy
    • 3.4 Authority Domains
    • 3.5 Trust Boundaries
    • 3.6 Data Flow Model
  4. Components

    • 4.1 Teleport Cluster
    • 4.2 Teleport Agents
    • 4.3 Vault SSH Secrets Engine
    • 4.4 Vault Database Secrets Engine
    • 4.5 External Secrets Operator
    • 4.6 Target Resources

Domain-Specific Sections

  1. Identity Integration

    • 5.1 Keycloak SSO Configuration
    • 5.2 Group-to-Role Mapping
    • 5.3 Authorization Ceiling Enforcement
    • 5.4 Token Claims for Access Decisions
  2. SSH Access

    • 6.1 Certificate-Based Authentication
    • 6.2 Vault SSH CA Integration
    • 6.3 Host Enrollment
    • 6.4 User Certificate Flow
    • 6.5 Principal Mapping
  3. Database Access

    • 7.1 Dynamic Credential Model
    • 7.2 Vault Database Engine Integration
    • 7.3 Supported Database Protocols
    • 7.4 Credential Lifecycle
    • 7.5 Query Logging
  4. Kubernetes Governance

    • 8.1 exec/attach Access Control
    • 8.2 Port-Forward Governance
    • 8.3 Namespace-Based Policies
    • 8.4 Integration with Kubernetes RBAC
    • 8.5 eBPF Session Capture
  5. Session Management

    • 9.1 Session Recording Requirements
    • 9.2 Recording Storage
    • 9.3 Session Playback
    • 9.4 Live Session Moderation
    • 9.5 Audit Log Integration
  6. Access Requests

    • 10.1 Just-in-Time Access Model
    • 10.2 Request Workflow
    • 10.3 Approval Chains
    • 10.4 Time-Bound Access Grants
    • 10.5 Notification Integration
  7. GitOps Integration

    • 11.1 Configuration in Git
    • 11.2 Role Definitions
    • 11.3 Policy Management
    • 11.4 ESO Secret Distribution
    • 11.5 GitOps Boundary

Supplementary Sections

  1. Rationale

    • 12.1 Why Teleport
    • 12.2 Alternative Access Brokers
    • 12.3 Alternative Credential Models
    • 12.4 Why Separate from RFC-WORKLOAD-IDENTITY
  2. Evolution

    • 13.1 Anticipated Extensions
    • 13.2 Scalability Considerations
    • 13.3 Migration Pathways

Appendices

  • Appendix A: Glossary

    • A.1 Term Definitions
    • A.2 Diagram Index
    • A.3 Abbreviations
  • Appendix B: References

    • B.1 Normative References
    • B.2 Technology Documentation
    • B.3 Informative References
    • B.4 Internal References
    • B.5 Version History

Reading Paths

For Platform Architects

Understanding the complete PAM design:

  1. Introduction — Problem context
  2. Requirements — Constraints and invariants
  3. Architecture — High-level design
  4. Identity Integration — Keycloak relationship
  5. Rationale — Design decisions

For Security Engineers

Evaluating security boundaries and controls:

  1. Requirements §2.4 — Security invariants
  2. Architecture §3.5 — Trust boundaries
  3. Session Management — Audit capabilities
  4. Access Requests — JIT access workflow

For DevOps/SRE Engineers

Understanding operational integration:

  1. Components — System components
  2. SSH Access — Server access
  3. Database Access — Database access
  4. Kubernetes Governance — K8s exec access
  5. GitOps Integration — Deployment model

For Compliance Officers

Understanding audit and compliance capabilities:

  1. Session Management — Recording requirements
  2. Access Requests — Approval workflows
  3. Appendix B §B.1 — Compliance standards

Document Navigation

PreviousIndexNext
Table of Contents1. Introduction →

End of Index