Xton Access Manager Product Update 2.3.201910070936
Today we released new update to the Xton Privileged Access Manager software. This update adds support for distributed HTTP Proxy chaining to connect to WEB Portals in isolated networks using IP and host mask rules.
Added support for distributed HTTP Proxy chaining
New update adds the option to chain HTTP(s) Proxy servers to enable distributed deployment when a client side browser connects to the destination WEB Portals in the network outside of the reach of both client computer and main node HTTP(s) Proxy server through the remote HTTP(s) Proxy server deployed into the destination network.
Remote HTTP Proxy will be enabled automatically on the remote node based on HTTP Proxy configuration (HTTP Proxy Enabled and HTTP Proxy Port) and the encryption key (defined by the main node configuration property cas.tgc.crypto.signing.key) communicated from the main node. Alternatively, Remote HTTP Proxy deployed on a non-remote node could be enabled on any XTAM node by synchronizing encryption key (cas.tgc.crypto.signing.key) in the configuration property file between HTTP Proxy chain nodes in addition to specifying parameters: xtam.http.proxy.enabled=true and xtam.http.proxy.port to initialize the Remote HTTP Proxy serving in a local mode.
Main node configuration for Remote HTTP Proxy is based on the Proximity Groups following the logic in-browser Session Manager uses to distribute the traffic. HTTP Proxy connection will choose the Remote HTTP Proxy server based on the destination server host name, IP address. Note that a vault-based proximity groups scenario is not supported in routing HTTP traffic through chained HTTP Proxy.
Please review key features documentation and product news using the links below
- XTAM Status or Health Check Page
- Xton Access Manager Security Hardening Guide
- XTAM Password Vault Free Trial Download
- Xton Access Manager User Manual
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.