Pricing
Transparent pricing structure and plans customized to your needs.
12Port Priviledged Access Managment Platform
12Port PAM pricing is per Named Privileged User per month.
Licensing applies only to human users or machine identities that initiate privileged access through 12Port.
Standard employees, business users, directory users, and non-privileged accounts are not licensed.
12Port
Privileged Access Managment
$20
-
Per Named Privileged User/month
(Privileged access initiators) -
Free Trial : Easy Setup and Management
-
In most organizations, only 2–10 percent
of users require PAM licenses -
Phone, Email and Web Meeting support included
12Port Privileged Access Management Features
| Deployment Features | |
| Physical, Virtual and Cloud Installation | |
| Windows and Linux Deployments | |
| Internal, Oracle, MS SQL Server, MySQL or PostgreSQL options for the backend database | |
| WEB-based GUI | |
| Multiple tenants with separate access URL and backend database per tenant | |
| REST API for all functions | |
| Event log. File system, SIEM, syslog integration. | |
| FIPS 140-3 Certified Encryption | |
| Credential Vault | |
| Policy-Driven Access Workflows | |
| Container-Based Secret Hierarchy | |
| Custom Asset Types | |
| Automated Secret Import & Tagging | |
| Intelligent Auto-Tagging & Metadata Management | |
| Granular Role-Based Access Control (RBAC) with Inheritance | |
| Advanced Search & Navigation | |
| Hierarchical taxonomy with flexible navigation and selection | |
| Sub-sites for projects and delegation | |
| Historical change control for asset management | |
| Strong encryption for credential access | |
| Comprehensive Audit & Reporting | |
| Remote Session Access | |
| Granular Session Policies with RBAC | |
| MFA and Approval-Based Session Launch | |
| Flexible Session Launcher Options | |
| Session Monitoring and Video Playback | |
| Detailed Session Activity Logging | |
| Protocol-Agnostic Access Support | |
| Session Gateways and Peer Nodes | |
| Session Policy Inheritance with Overrides | |
| Integrated Credential Management | |
| Comprehensive Session Reporting | |
| Credential Rotation | |
| Automated Password and SSH Key Rotation | |
| Credential Injection with Shadow Accounts | |
| Centralized Credential Policy Enforcement | |
| Support for Multiple Key Formats and Algorithms | |
| Event- and Schedule-Based Rotation Triggers | |
| Scripting and Task Automation Engine | |
| Cross-Platform Remote Execution | |
| Peer Node Support for Distributed Environments | |
| Detailed Job and Event Audit Logs | |
| Granular Role-Based Permissions and Policy Inheritance | |
| Endpoint Management | |
| WinRM, SSH communication protocols | |
| PowerShell, Shell, Groovy scripting | |
| Regular expressions, XSLT parsers | |
| Customizable script and parsers libraries | |
| Out of the box scripts and parsers for Windows Defender firewall and Linux iptables | |
| Documented parser API and parser debug | |
| Event-based or scheduled task execution policies | |
| Jobs report. Raw input and output. | |
| Authentication | |
| Microsoft AD, LDAP | |
| Entra ID | |
| Local user directories segregated by tenants and spaces | |
| SSO, SAML | |
| MFA: TOTP, Google Authenticator, Yubikey, Duo Security, Radius, Mail Code | |
| MFA configuration per users and groups | |
| User access report | |