Hi Shabahz,
Our Implementation Guide has a good explanation of what PAMSC achieves. You can find the link below.
Plan Your Enterprise Implementation - CA Privileged Access Manager Server Control - 14.0 - CA Technologies Documentation
To explain it further, PAMSC has three primary components: the PAMSC endpoint, UNAB, and Enterprise Management.
The PAMSC Endpoint: The PAMSC endpoint audits usage on a server and enforces security rules to restrict access to sensitive files/programs. It is a second layer of security on top of OS-level controls.
Unix Authentication Broker (UNAB): This component will allow for LDAP authentication on Linux/Unix servers.
Enterprise Management: This is the component that allows for central management of both PAMSC and UNAB endpoints.
If you decide to use PAMSC, you can integrate it with PAM so when a user logs into a target device with PAMSC on it, they will be audited as the user's login name rather than the target account.
CA Privileged Access Manager Server Control Login Integration - CA Privileged Access Manager - 3.2 - CA Technologies Doc…
Please let me know if you have any follow-up questions.
Kind Regards,
Brian Rehder
Senior Support Engineer
CA Technologies