Any IT infrastructure hosts a multitude of accounts, each with their own levels of rights and privileges. Some accounts consist of only users and may not have the rights to access files, install programs or change configuration settings. At the same time there are other accounts within the same infrastructure with different permission levels, which might have some or all of these rights. These accounts with higher permission levels are known as Privileged Identities (PI’s), super user accounts or super control accounts.