Xton Access Manager Product Update 2.3.201909012238
Today we released new update to the Xton Privileged Access Manager software. This update adds support to store Google Authenticator App secret key in a record with the option to generate tokens and also adds the option to review and import selected accounts discovered on the remote Windows and Unix hosts.
Added embedded Google Authentication App
New update adds the option to store Google Authenticator secret key in a record with the option to generate tokens on demand. This option allows to backup Google Authentication secret keys to store them in a secure reliable location. In addition to this, the option allows to enable multi-factor authentication for shared privileged accounts. Shared MFA token generation is granted to selected users using role-based access control as well as location, time and approval based workflow. In addition to that the TOTP generation is logged in the system audit log to track the use of the service.
Google Authenticator is an XTAM record type hidden in the default installations so it should be enabled in the Administration / Record Types list. Records of the Google Authenticator record type include the only field Secret Key. When saved, the Google Authenticator record includes the only available task in the Execute menu: Generate Google Authenticator Token that pops up a window with the token visible on the screen.
Users using the service need to have a View and Execute permission to Google Authenticator records. This way, these users can generate TOTP without the option to unlock the secret key. User access might further be restricted by applying Task Control workflow binding to limit time, location of the service use or require human or automatic approval process.
Added the option to review and import accounts detected on the discovered hosts
The update adds the option to detect accounts on discovered Unix and Windows computers while doing network discovery process. The update also add the option to import selected accounts as system records. Since the system does not know the passwords to access these accounts, it adds the main account used to discover this end point as a shadow record for imported accounts task lists. This way, the password set job will be used by the shadow record to manage the password for the imported related accounts.
Please review key features documentation and product news using the links below
- Save, Share and Generate Google MFA Tokens
- Xton Access Manager Free Trial Download
- Find the perfect edition for your business.
- Which Privileged Access Management Solution is Right for You?
- XTAM Password Vault Free Trial Download
- Xton Access Manager User Manual
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.