Free PAM & Zero Trust Security Tools
Harden privileged access, build RBAC policies, plan credential rotation, assess PAM maturity, and secure your infrastructure — all in your browser, no signup required.
Privileged Access & Credentials
Harden access protocols, audit keys, and plan credential lifecycle management
SSH Config Builder
PopularVisual multi-host SSH config generator with bastion chains, wildcard patterns, and best-practice defaults. Download ready-to-use config.
OpenSSH Hardening Generator
PopularLike Mozilla SSL Config but for sshd_config. Select OS, version, and security profile. Get a production-ready hardened config with explanations.
SSH Key Inventory Auditor
Paste SSH public keys and get a full audit: algorithm strength, bit length, duplicates, missing comments, and rotation recommendations.
SSH Banner Generator
Create legal warning banners for SSH login. Generate /etc/issue, /etc/motd, and sshd_config Banner content with compliance-ready templates for SOC 2, HIPAA, and PCI DSS.
RDP Hardening Generator
NewConfigure NLA, encryption levels, session timeouts, and GPO settings for secure Remote Desktop access. Export as PowerShell, registry commands, or documentation.
Password Policy Generator
Create enterprise password policies with complexity requirements, rotation schedules, and compliance mappings. Export as policy documents or PAM configuration.
Credential Rotation Planner
NewPlan rotation schedules for SSH keys, database passwords, API tokens, and service account credentials. Get a prioritized calendar with compliance gap analysis.
Privileged Account Discovery
NewInteractive checklist to discover privileged accounts across Linux, Windows, cloud, databases, and applications. Get a risk-scored inventory with an onboarding plan.
Access Governance & RBAC
Build role-based policies, manage access reviews, and audit non-human identities
RBAC Policy Generator
PopularDefine roles, permissions, and resource access rules. Export role-based access control policies as JSON, YAML, or formatted policy documents for your access review.
JIT Access Policy Generator
NewBuild just-in-time access policies with time windows, approval requirements, auto-revocation, and break-glass overrides. Export as JSON or YAML.
User Provisioning Generator
Generate idempotent Linux user setup scripts with SSH keys, sudo policies, group membership, and rollback scripts.
Access Review Report Builder
Define users, resources, and access mappings. Get automated findings and export audit-ready quarterly review reports.
Kubernetes RBAC Generator
NewBuild least-privilege ClusterRoles, Roles, and RoleBindings with presets for common patterns. Export production-ready YAML for kubectl apply.
Service Account Auditor
NewCatalog non-human and machine identities with risk scoring by privilege level, credential age, and MFA status. Get recommendations for securing service accounts.
Compliance & Assessment
Assess PAM maturity, map compliance controls, and plan session recording policies
PAM Maturity Assessment
NewScore your organization across identity, access governance, session management, credential vaulting, and compliance. Get a prioritized roadmap to improve PAM maturity.
Compliance Access Control Mapper
Cross-reference access control requirements across SOC 2, HIPAA, PCI-DSS, ISO 27001, and NIST 800-53. Track implementation and export.
Zero Trust Readiness
Evaluate your organization's Zero Trust readiness across identity, network, device, and data pillars. Get a scored report with actionable next steps.
MFA Readiness Assessment
Evaluate your organization's readiness for multi-factor authentication. Get recommendations for MFA methods, rollout strategy, and user communication plans.
Session Recording Policy Builder
NewDefine recording rules per protocol — SSH keystrokes, RDP video, database queries, clipboard activity. Export as a JSON policy document.
Incident Response Playbook
Select a security scenario (compromised key, unauthorized access, privilege escalation) and get a step-by-step response playbook.
Guides & Reference
Step-by-step guides and audit scripts for infrastructure security
LDAP + OpenSSH Auth Guide
Complete production guide to centralize SSH authentication with LDAP using SSSD, PAM, and public key lookup. Covers OpenLDAP and Active Directory on Ubuntu and RHEL.
AD Hardening Audit Generator
Generate comprehensive PowerShell scripts to audit AD hardening — password policies, Kerberos security, privileged access, stale objects, GPO settings, LDAP security, and DC health. CIS & NIST aligned.
Frequently Asked Questions
Everything you need to know about our free PAM security tools and OnePAM