Xton Access Manager Product Update 2.3.201905122212
Today we released new update to the Xton Privileged Access Manager software. This update adds traffic recording for MySQL and MS SQL Server databases, Audit Log archiving and broader support for Radius MFA.
Added traffic recording for MySQL and MS SQL Server databases
The update adds the option to save SQL statements to the Session Events Logs when connecting to MySQL or MS SQL Server database servers through SSH Proxy tunnels using native clients such as MySQL Workbench, MS SQL Studio, command line SQL prompts or other client applications. The option to record SQL traffic helps to understand typical administration activities, alert stakeholders about suspicious queries or to comply with regulations.
The traffic recording option is controlled by Session Events Recording permission level setup for for SSH Tunnels used to establish SQL connection.
The traffic recording option is enabled automatically for tunnel channels opened through SSH Tunnel to standard ports (port 3306 for MySQL and port 1433 for MS SQL). It is also possible to provide hints to the SSH Tunnel to enable traffic monitoring established on a non-standard ports. To provide a hint for the SSH Tunnel record, first, create a field in the Record Type describing an SSH Tunnel record with the Name: TrafficIntercepterHints, Display Name: Traffic Intercepter Hints, Type: String. After that create a value for a hint in the SSH Tunnel record itself. The hint is a comma-, space- or semicolon-separated list of protocols and ports that should be recorded. For example the hint: mssql:1444 mysql:3333 instructs recording for the MS SQL Server traffic connecting to port 1444 and MySQL traffic connecting to port 3333
Added Audit Log archiving option
The update adds the option to automatically archive audit log entries including saving old entries to CSV export to the system export folder and deleting them from the database based on configured Audit Log Retention time in days. The option is useful to comply with the organization electronic records retention policies as well as to limit the load on system database.
Added broader support for Radius MFA
The update adds support for Multi-Factor Authentication option using Radius-based devices that require user authentication with credentials provided during 1st factor stage to generate customized token for each user based on repeated first-factor authentication. One example of such device is SMS Passcode popular in the Northern Europe.
Please review key features documentation and product news using the links below
- May 2019 Newsletter
- YubiKey MFA – How to Configure in XTAM
- YubiKey MFA – How to Login to Xton Access Manager as a User
- Getting Started Guide
- Xton Technologies News and Events
- Xton Access Manager How-To Guides
- Explore Our PAM Features and Highlights
- Explore a pre-configured live demo in our environment
- Best Practices Guide provides insights into both Concepts and Design elements for users looking to build out their PAM deployment
The software requires about five minutes to install on a freshly built Windows or Linux server or desktop with 1+ Gb RAM and no pre-requisites. After installation, please follow our Getting Started Guide for step-by-step introduction to the application.
Read the product documentation including Windows and Linux installation instructions as well as Getting Started Guide: https://www.xtontech.com/resources/documentation/
Follow this link for the instructions how to update the existing setup: https://www.xtontech.com/resources/faq/updating-xton-access-manager-version/
Check the software pricing, including options and licensing FAQ: https://www.xtontech.com/store/
We appreciate your feedback and comments about Xton Access Manager and also about handling privileged accounts, passwords, keys and certificates as well as sessions to remote computers in general.
Thank you for your interest in our product.
Xton Technologies team
Xton Access Manager for Privileged Access Management (PAM) provides complete, control for your privileged passwords, secrets, certificates and documents to meet audit requirements while limiting your risk of security breaches. It’s easy to install, affordable, cloud-ready and offers unlimited use and storage
Please fill out this form to receive a download link to get started today, even on your current desktop or laptop. Documentation is available to help or you can email or call us to request a trial extension, discuss questions and share your feedback. We would love to talk to you.