Xton Access Manager Product Update 2.3.202011012311
Today we released new update to the Xton Privileged Access Manager software. This update adds custom banners for SSH Proxy and more flexibility to ports and jump hosts selection in complex distributed deployment scenarios.
Added flexibility to ports and jump hosts selection in complex distributed deployment scenarios
The update added the option to define custom port for remote Native Session Manager in the proximity groups. XTAM uses remote session managers to provide access to isolated networks for WEB sessions as well as sessions established using native clients such as PuTTY, mstsc, WinSCP and others. While remote WEB session manager allowed flexible port selection for a while, this update brings custom port selection for the session manager for native clients too instead of mandating all remote session managers to share the same port with the one on the master node. The option enables multi-site distributed deployment with Transparent Perimeter option providing access to native clients. The option also allows to share Native Session Manager (as much as WEB Session Managers before) between multiple independent master nodes.
The update added the option to select a reverse jump host for Transparent Perimeter deployment option to be different than the master node itself. The option allows to increase security of the master cluster by hosting reverse jump host in DMZ to avoid exposure of the master nodes to external SSH traffic. The option also allows to offload reverse tunnel from the master node that might not allow SSH tunneling.
Added the option to customize SSH Proxy banner
The update added SSH Proxy banner customization using global parameter SSH Proxy Banned (service restart required). The option allows to add a message of the day or a legal disclaimer during login to the XTAM SSH Proxy and Proxy Shell.
Added user name based place-holders for dynamic credential resolution
The update added more options for dynamic credential resolution, this time based on first and last name of the currently logged in user in addition to just the login name itself. Record owners can now use $first-name and $last-name place-holders in the search criteria for dynamic record resolution in the User field of the main record. The option allows more flexible mapping between personal and privileged accounts as well as complex rules for Red Forest implementations to protect privileged assets.
Please review key features documentation and product news using the links below
- Transparent Perimeter deployment
- XTAM Gateway
- XTAM REST API Documentation
- XTAM Password Vault Free Trial Download
- Xton Access Manager User Manual
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 2+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.
The Featured image for this article is Background vector created by rawpixel.com – www.freepik.com