Getting Started
Installation and setup of Privileged Elevation and Delegation Management (PEDM)

Keeper Endpoint Privileged Manager (EPM) helps you control privilege elevation, file access, and command execution across your endpoints. This section walks you through licensing, activation, permissions, deployment overview, and how requests are managed at a high level.
Setup Steps
Keeper Endpoint Privileged Manager (EPM) helps you control privilege elevation, file access, and command execution across your endpoints. This section walks you through licensing, activation, permissions, deployment overview, and how requests are managed at a high level.
Follow the below steps to start using Endpoint Privilege Manager.
Keeper Enterprise license
Keeper EPM is part of Keeper Enterprise. You need:
An active Keeper Enterprise subscription that includes Endpoint Privileged Manager (EPM).
Enough endpoint seats for the agents you plan to deploy.
Activation and seat allocation are done in the Keeper Admin Console. If you’re not sure about your license or EPM entitlement, contact Keeper or your account team.
If you are not a Keeper customer or do not have the required license, you can start a free trial from our website. The free trial includes KeeperPAM full capabilities.
Activate Endpoint Privileged Manager
Log in to the Keeper Admin Console (dashboard).
Turn on Endpoint Privileged Manager for your organization. The exact menu may be named “Endpoint Privileged Manager,” “Privilege Manager,” or similar depending on your console version.
Get a registration token for your agents. You’ll use this when registering each endpoint. The token format is:
hostname:deployment-uid:private-keyStore it securely; you’ll need it for every new agent.
After activation, you can define approvers, collections, policies, and deployment groups, then deploy agents to your endpoints.

Enable Permissions
With Endpoint Privilege Manager, an admin role is required with permissions covering end-user privilege.
Login to the Keeper Admin Console for your region.
Under Admin > Roles, create a new role or modify an existing role
In the Role settings select the "Administrative Permissions" tab and select "Add Managing Node".
Activate the "Manage Privileged Access" permission.
Assign yourself or your test admin account to this role.

Verify and Start the Service
Windows (PowerShell): Check:
Get-Service | Where-Object {$.Name -match 'keeper' -or $.DisplayName -match 'keeper'} | Select-Object Name, DisplayName, StatusStart:Get-Service | Where-Object {$.Name -match 'keeper' -or $.DisplayName -match 'keeper'} | Where-Object {$_.Status -ne 'Running'} | Start-ServiceLinux (KeeperSudo): Check:
sudo systemctl status keeper-privilege-managerStart:sudo systemctl start keeper-privilege-managerOptional:sudo systemctl enable keeper-privilege-managerfor auto-start.macOS: Use the provided launchd configuration to load and start the Keeper service.
Last updated
Was this helpful?

