What is superuser? - Definition from WhatIs.com
Part of the Network administration glossary:

A superuser is a network account with privilege levels far beyond those of most user accounts.

Superuser accounts may belong to network or system administrators, database administrators (DBAs), CIOs or CEOs. In larger enterprises, a superuser account is often accessed by multiple users. 

Superuser accounts are necessary for platform management functions but it's necessary to control and oversee them. Because these accounts have elevated access rights, those with access can bypass the internal controls of the target platform. Once these controls are bypassed, users can breach confidential information, change transactions and destroy audit data. 

To protect corporate networks from misuse or abuse of superuser accounts, privileged identity management (PIM) policies and processes should be established. 

This was last updated in November 2013
Contributor(s): Ivy Wigmore
Posted by: Margaret Rouse

Related Terms


  • private cloud appliance

    - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network. (WhatIs.com)

  • EMC Corporation

    - EMC Corporation is a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastruc... (WhatIs.com)

  • data reduction

    - Data reduction minimizes the amount of data an organization needs to store, usually by eliminating redundant information. The most common data reduction methods are deduplication and compression. (SearchDataBackup.com)


  • Network administration

    - Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • How effective are antivirus apps for Android?

    I have used a couple of them earlier..but not really sure if they are actually of use. It would really be good if some one can provide some insights.

  • Privacy of Data - SAP Implementation

    <i>Is he justified in asking for that?</i> If the privilege is granted, yes. Otherwise, no. Regardless, the consultant should have no difficulty in providing acceptable justification....

  • How to Force a Joblog.

    Hi, Maybe the easiest way is to change the default on the SIGNOFF command to LOG(*LIST) instead of LOG(*NOLIST). Regards, Martin Gilbert.

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.