Protect privileged access with PIM
Private Access can be combined with Privileged Identity Management to add an extra security layer to protect critical resources. This article explains how to configure PIM to enable just-in-time access to critical resources so elevation of access is required and access expires after a certain time.
Secure private application access with Privileged Identity Management (PIM) and Global Secure Access