My main use case for One Identity Safeguard is controlling low-level admin access to systems without directly sharing traditional credentials. Day to day, we allow access through One Identity Safeguard, which automatically handles authentication in the backend instead of giving passwords.
In our setup, we use One Identity Safeguard to control admin access by not sharing admin credentials directly with users anymore. Everything goes through One Identity Safeguard, where if an admin needs access to production servers, they log in to One Identity Safeguard and request access to that particular system instead of receiving the username and password.
Regarding my main use case with One Identity Safeguard, during the session, everything is monitored and recorded, such as what commands we run and what changes we have made. If anything looks suspicious, we can terminate the session or review it later, which is very helpful.