Privileged Account Standard

Privileged Account Standard

Scope

This standard applies to all privileged or administrative accounts, including but not limited to Microsoft Entra ID, Microsoft Active Directory, Kerberos, and 389 Directory/LDAP. It governs the creation, use, management, and deprovisioning of accounts that provide elevated access to university systems, applications, and data for the purpose of system administration, security operations, and infrastructure management. 

This standard applies to:

  • Administrators with elevated access to software components or systems.

  • Research computing administrators managing high-performance computing environments.

  • Cloud and on-premises infrastructure administrators (e.g., Azure, AWS, Linux, VMware, Windows)

  • Security personnel with access to monitoring, logging, and incident response tools.

  • Application administrators with privileged access to configuration and backend systems.

  • Individuals who manage access to workstations, servers and identities.

This standard does not apply to:

  • Standard user accounts for faculty, staff, students, or guests

  • Service accounts used by applications, scripts, or automated processes.

  • Temporary guest accounts without elevated access

Definitions

Central Identity Authority

A trusted system that manages and verifies digital identities, centralizing authentication, authorization, which includes Microsoft Entra ID, Microsoft Active Directory, Kerberos, and 389/LDAP. 

Privileged Account (Administrator Account)

A privileged account is assigned to a verified individual and used exclusively for system-level, security-sensitive tasks or access control management.  Account sharing is prohibited, and Multi-Factor Authentication (MFA) is required for each session to ensure accountability.

Owner\Manager\Sponsor

A full-time university-affiliated faculty or staff member in a paid role responsible for overseeing, managing, and complying with a privileged account's lifecycle. This person is the primary point of contact for IT and security teams regarding the account’s usage, configuration, access controls, life cycle, and associated risk management. Unique individuals are not required to fill these roles; multiple users may hold the same role if appropriate.

Software Components

Applications, services, scripts, containers, or integrations between applications, services, scripts, and containers.

Standards and Procedures

Eligibility

Administrator accounts are granted only to active university employees (Including Student Employees) in technical roles requiring elevated system access, or users who manage other users' identities.

Multi-factor authentication (MFA)

MFA is required for all privileged access accounts.

Password Length and Lifecycle Hygiene 

Naming Convention

The “NetID” (uid in 389/LDAP, sAMAccountName/CN in Active Directory) will be the responsible user’s normal NetID prefixed by a_

The email address, and userPrincipalName attribute in Active Directory, will be the user’s normal email alias, prefixed by a_ with a domain suffix of @admin.albany.edu.

Provisioning / De-Provisioning

Provisioning:

  • Must minimally meet the requirements of the Generic Account Standard.

  • Administrator accounts will be set to have an expiration date of 10 years.

Account Review

Administrative accounts are required to undergo a monthly review to verify that the user remains eligible for the account.

Deprovisioning:

Must minimally meet the requirements of the Generic Account Standard.

Logging and Auditing

Must minimally meet the requirements of the Generic Account Standard.

Exceptions

Must minimally meet the requirements of the Generic Account Standard.

Incident Response

Must minimally meet the requirements of the Generic Account Standard.