Xton Access Manager Product Update 2.3.201902172217
Today we released new update to the Xton Privileged Access Manager software. Highlights of this update include Object Access report displaying the list of all users who have access to the selected object and support for dynamic and pass-through credentials when establishing high trust connections to remote devices using native SSH applications such as SSH shell, Secure CRT or PuTTY.
Added Object Access report displaying the list of all users who have access to the selected object
The update adds Object Access report displaying the list of all users who have access to the selected object with the list of access level (global role, global permission or an object ALC) and an access path through the local or external user directory group. The report is available on the object permissions screen and as a drill down option on the inventory report.
The report answers the basic question: Who can see and do something with the selected object. In addition to this, the report clarifies how exactly a person has the reported privilege: whether through the active directory group, object ACL or a global permission.
Added SSH Proxy dynamic credentials support for the native SSH clients
Dynamic credentials support for native SSH applications allows connecting to the remote computers using credentials specific for the user performing the connection instead of the credentials on the record applicable to all users. The option allows to configure several privileged accounts shared by different groups of users. This approach facilitates hardened security IT management patterns such as Red Forest isolating critical infrastructure to be accessed by the account from dedicated user space. It also improves precision of end-point access monitoring providing specific account information for different types of access.
Dynamic credentials option is long available for in-browser sessions. This update brings it to the SSH Proxy providing access to native SSH applications.
Added SSH Proxy pass-through credentials support for the native SSH clients
Pass-through credentials support for native SSH applications allows connecting to the remote computers using personal credentials provided by the user when logging in to the SSH proxy. This option enables proxying remote connections through the single jump server from the remote locations into the corporate network inside the firewall perimeter using the regular personal accounts from the organization user directory without VPN tunnel exposing all network assets to the outside endpoint.
Pass-through credentials option is long available for in-browser sessions. This update brings it to the SSH Proxy providing access to native SSH applications.
Please review key features documentation and product news using the links below
- Your February 2019 XTON Access Manager Newsletter!
- Getting Ready for RSA Conference – 3 Security Trends to Watch
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.