Xton Access Manager Product Update 2.3.201912012240
Today we released new update to the Xton Privileged Access Manager software. This update adds RDP Proxy component to enable high trust access to remote Windows devices using native RDP applications.
Added RDP Proxy component to enable high trust access to remote Windows devices using native RDP applications
This update adds the option to access remote windows computers using wide variety of native RDP clients including Microsoft Remote Desktop Client (mstsc) from Windows computers, mobile devices, phones or tablets run on different Operating Systems. This option significantly accelerates adoption of secure practices in the distributed networks because system administrators can continue using their traditional access techniques while relying on PAM infrastructure for controlled, managed and audited access. At the same time, RDP Proxy architecture ensures that sensitive access credentials remain locked at the central vault and not released to the client workstations potentially located outside of the corporate network even in an encrypted form for these workstations to decrypt.
RDP Proxy feature allows high trust login to remote servers using the credentials defined on the record usually concealed from the operator. RDP Proxy also includes audit logging about the start and end of the access, session reporting, role-based, just-in-time and temporary access, time-, location- and duration-based access requests, and password rotation after the access completed.
RDP Proxy feature could be enabled in latest XTAM deployments using system parameter RDP Proxy and optionally specifying RDP Proxy Port. XTAM server has to be restarted after changing parameters. To establish access to remote server, configure a native RDP client connection using user#record-id or user#record-name as a user and an XTAM user password for an XTAM user with the access to establish connection to the remote resource.
Read more about the RDP Proxy rationale, use cases, configuration, use and examples of the applications in the link “Creating secure RDP proxy sessions using your native Desktop or Mobile Applications” below.
XTAM will continue supporting existing methods to connect to Windows servers using in-browser sessions. XTAM also supports access to remote Unix and Linux devices using both in-browser and SSH Proxy sessions established using native clients.
Please review key features documentation and product news using the links below
- Creating secure RDP proxy sessions using your native Desktop or Mobile Applications
- Creating secure PAM RDP sessions with or without the use of Native Client Side Applications
- PAM Solutions for DevOps and Application to Application Password Management
- XTAM Password Vault Free Trial Download
- Xton Access Manager User Manual
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.