Book Demo!

Connecting to a Unix Host with a Key

This Quick Take video demonstrates one of the fundamental Xton Access Manager function – connecting to a Unix host using a key without exposing credentials (and the key) used to connect.

Xton Privileged Account and Access Management Video Elevation of Privileges Windows Host

Video Highlights

The video itself is self-explanatory. However, below are several important focus points to highlight

  • Remote Unix console is displayed in the client browser directly using HTML5. There is no special software required on the client side including ActiveX, applets or anything else. The connection looks the same in any modern HTML5 browser on Windows or Linux desktop or mobile device. This approach simplifies deployment and maintenance of Xton Access Manager and provides better control over sessions.
  • Xtom Access Manager does not transmit the key used to connect to a remote console to the client browser. The key is used by Xton server to connect to a remote console but it never transferred to the client desktop.
  • The session could be recorded to play back by administrators or auditors later
  • An auditor or an administrator might join or terminate the session while it is in progress
  • A user might open multiple sessions to different remote computers or devices at the same time.
  • A user might be granted permissions to connect to a remote Unix console with or without recording a session. In this case the user might choose the connection type. Alternatively, a user might be granted permissions to connect to a remote computer with session recording only. In this case the only Connect button would be available for the user on the Xton GUI

Categories: xton

Mark Klinchin

I am Co-Founder and CEO of Xton Technologies. I am interested in computers, software development, cyber security, content management, photography, image processing and mathematics.

Related Posts


How to enable Windows Remote Management using domain policy

Xton Access Manager (XTAM) uses Windows Remote Management technology to execute jobs such as password reset on the remote Windows computers. WinRM is enabled on the windows computer using the following command executed from command Read more…


Configuring Windows Server NLB for Multi-Node Deployment

Configuring Windows Server NLB for Multi-Node Deployment Architecture This article discusses details of Windows Network Load Balancer (NLB) configuration to balance two or more XTAM Server nodes. Earlier we discussed XTAM Server multi-node architecture built Read more…


The Challenge of Multi-Factor Authentication and Shared Accounts

Recently, I wrote about the importance of combining multi-factor authentication (MFA) and privileged access management. According to 2018 Global Password Security Report, 45% of organizations are already using two-factor authentication (2FA) and the 451 Group Read more…

Copyright © 2020 Xton Technologies, LLC. All rights reserved.