Xton Access Manager Product Update 2.3.201908042210
Today we released new update to the Xton Privileged Access Manager software. This update adds visual password strength indicator with recommendations how to improve weaker passwords and support for distributed SSH Proxy deployment serving native SSH clients to connect to devices in isolated networks.
Added visual password strength indicator with recommendations how to improve weaker passwords
This update added visual password strength indicator ranking typed passwords on the scale from Weak to Very Strong too all places system users type passwords. The indicator also provides suggestions about improving password strength for weak and fair ranked passwords.
The graphical indicator ranks password strength on the record editing screen for each password field, on the on-demand password reset screen, on local user editing form and on user profile password reset form.
In addition to this, the update adds generated password example preview on the Password Formula editor to visualize the passwords that can be generated using the formula on the screen. The password sample also includes the password strength indicator together with the password strength improvement recommendations.
Added support for distributed SSH Proxy chaining serving native SSH clients to connect to devices in isolated networks
New update adds the option to chain SSH Proxy servers to enable distributed deployment when a native SSH client (such as PuTTY or Secure CRT) connects to the destination device in the network outside of the reach of both client computer and main node SSH Proxy server through the remote SSH Proxy server deployed into the destination network. Such scenario was supported for a long time for in-browser sessions through distributed session managers (see the article in the links section below). This update brings this option to the sessions established using native SSH clients.
Remote SSH Proxy will be enabled automatically on the remote node based on HTTP Proxy configuration (HTTP Proxy Enabled and HTTP Proxy Port) and the encryption key (defined by the main node configuration property cas.tgc.crypto.signing.key) communicated from the main node. Alternatively, Remote SSH Proxy deployed on a non-remote node could be enabled on any XTAM node by synchronizing encryption key (cas.tgc.crypto.signing.key) in the configuration property file between SSH Proxy chain nodes in addition to specifying parameters: xtam.http.proxy.enabled=true and xtam.http.proxy.port to initialize the Remote SSH Proxy serving in a local mode. Note that technically Remote SSH Proxy is implemented as HTTP Proxy which is why HTTP Proxy parameters are reused for the configuration.
Main node configuration for Remote SSH Proxy is based on the Proximity Groups following the logic in-browser Session Manager uses to distribute the traffic. SSH Proxy connection will choose the Remote SSH Proxy server based on the destination server host name, IP address or a vault where the records is located.
Please review key features documentation and product news using the links below
- Capital One Data Breach and the Importance of Zero Trust Model
- KuppingerCole Executive View: Xton Technologies Access Manager
- Deployment Architecture to Scale Session Manager
- XTAM Password Vault Free Trial Download
- Xton Access Manager User Manual
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.