π οΈ Status: Currently under active development | Visit Website | GitHub
Argus Privilege Access Management (ArgusPAM) - Open-source database credential management with AI-assisted security. Because nobody likes a data breach! π
Our name comes from Argus Panoptes, the all-seeing giant from Greek mythology with a hundred eyes. Legend says he was so vigilant that only some of his eyes would sleep at a time - the others stayed wide open, watching everything. Just like our mythical namesake, ArgusPAM keeps constant watch over your database access. π‘οΈ
ArgusPAM is a Privileged Access Management (PAM) solution specifically designed for databases. It acts as a secure gateway between your team and your databases, ensuring that:
- The right people have access to the right databases
- Access is temporary and granted only when needed (Just-In-Time)
- Every action is logged and can be audited
- AI watches for unusual behavior and security risks
- Credentials are never shared directly with users
Instead of giving everyone direct database credentials (which is risky), ArgusPAM sits in the middle, managing who can access what, when, and for how long. It's like having a bouncer at a club who checks IDs, keeps a guest list, and remembers everyone who came in.
β The Problem:
- Shared database credentials across the team
- No visibility into who accessed what
- Credentials stored in wikis, Slack, sheets, or password managers
- When someone leaves, you must rotate all credentials
- No way to track what changes were made
- Difficult to meet compliance requirements (SOC 2, ISO 27001, GDPR)
- One compromised credential = full database access
Real-world scenario:
"Hey, what's the production database password?" "Check the #engineering Slack channel from 6 months ago" π₯ Anyone with Slack access now has production database access
β The Solution:
- Individual access tracking - Know exactly who accessed which database
- Time-limited access - Access expires automatically after X hours
- Zero shared credentials - Each person gets their own session
- Complete audit trail - Every query, every connection is logged
- AI-powered alerts - Unusual patterns trigger notifications
- Instant revocation - Remove access immediately when someone leaves
- Compliance ready - Meets SOC 2, ISO 27001, HIPAA requirements
- Multi-factor authentication - Extra security layer for sensitive data
Real-world scenario:
"I need production database access for 2 hours to debug issue #123" Clicks request β Manager approves β Access granted for 2 hours only β Automatic audit log + AI monitoring + access expires automatically
π’ Startups & SMEs (5-500 employees)
- Growing team that needs proper database security
- Preparing for SOC 2 or ISO 27001 certification
- Want to implement security best practices early
- Need audit trails for compliance
π₯ Healthcare & Finance
- Must comply with HIPAA, PCI-DSS, or SOX
- Handle sensitive patient or financial data
- Need detailed access logs for audits
- Require strict access controls
π Security-Conscious Organizations
- Take security seriously (as you should!)
- Want to implement Zero Trust principles
- Need granular access control
- Want AI-assisted threat detection
π₯ Distributed Teams
- Remote employees accessing databases
- Need context-aware access (location, time, device)
- Want to limit access based on IP or location
- Multiple timezones requiring temporary access
- Solo developers or very small teams (1-3 people) - overhead might not be worth it
- Organizations without databases (obviously!)
- Teams with read-only database access needs (simpler solutions exist)
- Projects without compliance or security requirements (though you should still care about security!)
Most database PAM solutions are:
- π° Expensive - $50k-$500k+ per year (enterprise pricing)
- π’ Enterprise-only - Designed for Fortune 500, not startups
- π€― Complex - Require dedicated security teams to operate
- π Closed-source - Vendor lock-in, no customization
- π Slow - Take months to deploy and configure
Meanwhile, small and medium businesses are:
- Sharing database credentials in Slack
- Using shared admin accounts
- Unable to track who did what
- Failing compliance audits
- Getting hacked due to compromised credentials
ArgusPAM brings enterprise-grade database security to everyone:
- π Open Source - Free to use, modify, and deploy
- πͺ SME-Friendly - Designed for teams of 5-500 people
- β‘ Quick Setup - Deploy in 15-30 minutes
- π§ AI-Powered - Smart security without complexity
- π οΈ Self-Hosted - Your data stays on your infrastructure
- π Modern Stack - Built with latest technologies (Laravel, Svelte)
We believe that every organization deserves proper database security, not just those who can afford six-figure contracts.
- Just-In-Time (JIT) Access - Temporary access that expires automatically
- Role-Based Access Control (RBAC) - Different permissions for different roles
- Principle of Least Privilege - Give only what's needed, nothing more
- Multi-Factor Authentication (MFA) - Extra security for sensitive operations
- Session Recording - See exactly what was done during each session
- Anomaly Detection - AI spots unusual access patterns
- Risk Scoring - Real-time risk assessment for each request
- Smart Alerts - Get notified about suspicious activity
- Behavioral Analysis - Learn normal patterns, flag anomalies
- Automated Recommendations - AI suggests security improvements
- Complete Audit Trail - Every connection, every query logged
- Compliance Reports - SOC 2, ISO 27001, HIPAA ready
- Access Reviews - Regular reviews of who has access to what
- Change Tracking - Know who made what changes
- Exportable Logs - Download logs for external audits
- Location-Based - Restrict access by IP or geographic location
- Time-Based - Allow access only during business hours
- Device Fingerprinting - Track which devices are used
- Connection Monitoring - Real-time view of active sessions
- Self-Service Portal - Request access without tickets
- Approval Workflows - Managers approve access requests
- Email Notifications - Stay informed about access requests
- Easy Onboarding - New team members get access in minutes
- Multi-Database Support - MySQL, PostgreSQL, MongoDB (coming soon)
- REST API - Integrate with your existing tools
- Docker-Based - Easy deployment and scaling
- High Availability - Run multiple instances for redundancy
- Backup & Restore - Built-in backup capabilities
Get ArgusPAM running with one command:
./setup.shThe setup script will:
- β Auto-generate secure database passwords
- β Auto-generate Laravel application key
- β Ask you for essential configuration (domain, SMTP, OpenAI)
- β Create a ready-to-use
.envfile - β Show you the next steps
Then start the application:
docker compose -f docker-compose.yml -f docker-compose.prod.yml up -d
# Wait ~30 seconds for containers to be healthy, then run installation:
docker exec -it arguspam-api php artisan pam:installStart Here:
-
- 3 simple methods to get started
- Interactive setup script walkthrough
- Time: 5-10 minutes
-
Complete Deployment Guide π
- Step-by-step from zero to production
- Server setup (DigitalOcean, AWS Lightsail, AWS EC2)
- Domain & DNS configuration with Cloudflare
- SSL/HTTPS setup options
- Time: 15-30 minutes
For Advanced Configuration:
-
Docker Environment Variables βοΈ
- Complete variable reference (150+ options)
- Resource allocation guide
- Scaling recommendations
-
Quick Reference π
- Command cheat sheet
- Common operations
- Troubleshooting quick fixes
-
Manual Configuration π οΈ
- Manual setup without script
- Production hardening
- Custom configurations
I just want to get it running fast:
β Run ./setup.sh (5 min)
I'm deploying for the first time: β DEPLOYMENT.md - Complete step-by-step guide (30 min)
I need specific commands: β QUICK_REFERENCE.md - Command reference
I want to customize resources: β DOCKER_ENV_VARIABLES.md - All configuration options
I'm having issues: β DEPLOYMENT.md - Troubleshooting
- Principle of Least Privilege (PoLP) - Only get what you need, nothing more
- Just-In-Time Access (JIT) - Temporary superpowers when you need them
- Role-Based Access Control (RBAC) - The right permissions for the right people
- AI-Assisted Security - Smart algorithms watching your back
- Multi-Factor Authentication (MFA) - Because passwords alone are so 2010
- User Contextual Awareness - Location and behavior tracking (in a non-creepy way)
- Complete Audit Trail - We remember everything
Choose based on your team size and expected usage:
| Size | CPU | RAM | Monthly Cost | Concurrent Users | Team Size | Use Case |
|---|---|---|---|---|---|---|
| Small | 2 cores | 4GB | $20-40 | 50-200 | 5-20 people | Small teams, testing |
| Medium | 4 cores | 8GB | $40-80 | 200-1000 | 20-100 people | SMEs, growing companies |
| Large | 8 cores | 16GB | $80-160 | 1000-5000 | 100-500 people | Large organizations |
Not sure? Start with Medium - you can always scale up or down later.
Detailed capacity estimates in env.prod.*.example files.
# Clone repository
git clone https://github.com/lunzai/arguspam.git
cd arguspam
# Run setup script
./setup.sh
# Start ArgusPAM
docker compose -f docker-compose.yml -f docker-compose.prod.yml up -d# Clone repository
git clone https://github.com/lunzai/arguspam.git
cd arguspam
# Copy and edit configuration
cp env.template .env
nano .env
# Start ArgusPAM
docker compose -f docker-compose.yml -f docker-compose.prod.yml up -d# Clone repository
git clone https://github.com/lunzai/arguspam.git
cd arguspam
# Start in development mode (auto-setup)
docker compose up -d| File | Purpose |
|---|---|
setup.sh |
Interactive setup script |
env.template |
Configuration template |
env.prod.small.example |
Small server configuration |
env.prod.medium.example |
Medium server configuration (recommended) |
env.prod.large.example |
Large server configuration |
docker-compose.yml |
Base Docker configuration |
docker-compose.override.yml |
Development overrides |
docker-compose.prod.yml |
Production overrides |
Services won't start:
docker compose logs
docker compose down
docker compose up -dCan't access the web interface:
- Access via IP:
http://YOUR_SERVER_IP:3000 - Check logs:
docker compose logs web - Check firewall: Ensure ports 3000, 8000 are open
Database connection errors:
docker compose ps mysql
docker compose logs mysql
docker compose restart api- Troubleshooting Guide - Common issues and solutions
- Quick Reference - Handy commands
- FAQ - Frequently asked questions
- GitHub Issues: Report bugs or request features
- Website: arguspam.com
- Email: support@arguspam.com
- Backend: Laravel 11 (PHP 8.3)
- Frontend: SvelteKit (TypeScript)
- Database: MySQL 8.0
- Cache/Queue: Redis 7
- Deployment: Docker + Docker Compose
- AI: OpenAI GPT-5
AGPL-3.0 License - See LICENSE file for details.
This means ArgusPAM is free and open-source, but if you modify it and deploy publicly, you must share your modifications.
We welcome contributions! Whether it's:
- π Bug reports
- π‘ Feature requests
- π Documentation improvements
- π§ Code contributions
Please open an issue or submit a pull request on GitHub.