Your browser does not allow storing cookies. We recommend enabling them.

User Account

What Is a User Account?

A user account is an identity created for a person in a computer or computing system. User accounts can also be created for machine entities, such as [service accounts](/iam/user/service-account() for running programs, system accounts for storing system files and processes, and root and administrator accounts for system administration.

A privileged account is a user account that has more privileges than a normal user account. Examples include database accounts, service accounts, root accounts, administrator accounts, and system accounts.

Interactive Account - a Standard User Account

The normal user account for a person is also called an interactive account or a standard user account. Such users can usually be used to log in using a password and can be used for running programs on the computer.

Non-User Account

The term non-user account is sometimes used for referring to all user accounts that are not standard user accounts.

Privileged Account Management

Privileged accounts, and particularly root and administrator accounts, grant high level privileges on computers. They can be used to surreptiously steal information, modify important data, change system configuration, and hide one's actions. They may also be used for installing and removing software and upgrading the operating system. Monitoring privileged accounts is thus very important for preventing cybercrime by employees and for detecting malware.

Privileged access management is a technology for controlling and monitoring access to privileged accounts.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more