!!! Overview
[{$pagename}] are valid [Digital Identities|Digital Identity] used to gain access to [Applications] or [Operating System].
 

[{$pagename}] are the subjects of [Privileged Account Management] systems.

[{$pagename}] provide elevated, often non-restrictive [Access Control] to the underlying platform that non-privileged user accounts would not have access too.

[{$pagename}] are designed to be used by sysadmins to deploy and manage [IT] technology, like [Operating Systems], network devices, [applications] and more. 

[{$pagename}] are the often the proverbial keys to the infrastructure – which is why [attackers] or [Bad Actor] insiders seek to steal them. 

We use the term [{$pagename}] interchangeably, but here are the most common [{$pagename}] found across most [Organizational Entity]'s environment(s):
* [Local Administrative Accounts] - These non-personal accounts provide administrative access to the [Local device]. (root or [Microsoft Windows] [Local Administrative Accounts]) 
* [Domain Administrative Accounts] - These accounts give privileged administrative access across a [Security Domain]
* [Emergency Accounts|Emergency Identity] - These provide unprivileged users with administrative access to secure systems in an emergency
* [Service Accounts] or [Application Accounts]- These can be privileged local or [Security Domain] accounts that are used by an [application]

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]