Version 5.5.0
Introduction
This document provides information on the new features, improvements and the fixed issues in the Version 5.5.0.
What’s New?
Session Management
[SPSL-3247] - Added a feature to allow access to accounts not managed by the Sectona Security Platform called Unvaulted Accounts.
[SPSL-5012] - Added a feature to capture Network Activity (queries/metadata) Log for database sessions accessed via Thick Client.
[SPSL-5107] - Added asset security configuration to remove old authorized SSH public key file after every SSH key rotation on the Unix Target Server.
[SPSL-5040] - Added scaling option in user setting for RDP Over Browser screen rendering.
[SPSL-4572] - Added restrictions to inhibit direct access to Unix servers with a Unix Monitoring Agent (UMON).
[SPSL-5005] - Added an option to open “Duplicate Tab” within a launcher for browser session.
[SPSL-5019] - Enhanced SSHD session security with Session Lockout and Enforce MFA every session.
[SPSL-5132] - Added support to route SSHD Proxy based sessions through the session proxy servers.
[SPSL-5161] - Removed the reconnect option from the RDP and SSH Over Browser sessions.
[SPSL-5162] - SSHD & RDPD proxy servers will auto start on Primary P2 and Application proxy nodes.
[SPSL-5009] - Added file download details for browser-based sessions in meatdata logs.
[SPSL-4668] - Added Activity Logs for App Services which include details about the Timestamp, System Nodes and Log Description.
[SPSL-4929] - Added new configuration parameters to restrict App Service to run between specific timeframes.
[SPSL-5025] - Added a feature to view user status change trail and MFA reset trail.
[SPSL-4645] - Added support for IMAP (including IMAP-TLS/IMAP-SSL protocols) with respect to incoming email gateway.
[SPSL-5063] - Added Oauth 2.0 as optional authentication for system management API authentication. [Currently supported basic authentication will be deprecated in upcoming versions.]
Account Management
[SPSL-5043] – Added support to identify asset in Database including Windows and Unix asset types for an AD Sync service.
[SPSL-4930] – Improve performance and reduced time in AD Sync service
[SPSL-4563] – Included password policy, password manager job information (auto or manually) in account activity graph
Event, Monitoring & Notification
[SPSL-4664] - Added notifications and event to update changes in user status depending on whether the User is Active, Disabled, Locked, Dormant, Unlock.
[SPSL-4665] – Added notifications and event for user deletion.
[SPSL-4667] - Added notifications and event for asset and account deletion.
[SPSL-4669] - Added notifications for System Vault Backup Failed and System Vault Backup Success.
[SPSL-5034] - Added details within the notification email about Account Type with its respective credential type for Workflow Approved - Password notification template.
[SPSL-5166] - Added asset IP address content tag for workflow notifications template.
[SPSL-5008] - Added notifications and event Password Checkout and Concurrent Sessions Started.
Asset Management
[SPSL-5149] - Added Preferred Host Key Algorithms, Use Legacy Group Exchange and Allow Keyboard Interaction in asset security settings primarily for Unix based assets.
[SPSL-5017] – Added “Enforce Host Name for Connection” option in asset configuration to use hostname instead of IP address.
[SPSL-5059] - Added new asset type as Azure Entra ID with password rotation support.
Discovery
[SPSL-4672] - Added Windows (RDP) and Unix (SSH) custom port option in Network Scan for Asset Discovery.
[SPSL-4570] - Added support for Unix based operating system to act as Session Proxy. Based on configuration, system will route all asset and account related transactions via session proxy.
[SPSL-5004] – Added AD “Group Name” as a mandatory configuration in account discovery when Auto Onboarding is set to 'Yes'.
Configuration
[SPSL-5021] - Added option to customise the Login page depending on the Login Type by changing appearance settings.
[SPSL-5146] - Added LDAPS support to Browse AD & Directory Store.
User Management
[SPSL-5126] - Added “Custom Attribute 1” and “Custom Attribute 2” in user configuration, same will be available in workflow configuration as additional user attribute.
[SPSL-4633] - Added a feature to copy User Profile during user creation including license assignment and access entitlements.
[SPSL-5011] - Added support to send email notification to user before changing user status to dormant.
[SPSL-4632] - Deprecated and removed Sectona App OTP as a Multi-Factor Authentication feature.
Workflow
[SPSL-3300] - Added support to raise a ticket on external ITSM/Service Desk when workflow request raised in the system.
[SPSL-4932] - Added out of box integration for Motadata as a Service Desk system.
[SPSL-1724] - Enhanced support for Service Desk Ticket closure when a user disconnects browser-based sessions.
Reporting and Dashboard
[SPSL-4754] - Added ISO/IEC 27001: 2022 compliance reports under analytics.
[SPSL-5142] - Added system defined report for Unmanaged Assets.
Policies
[SPSL-5117] – Added option to add multiple Just-In-Time profiles based on asset type in single Asset JIT Policy.
Fixed Issues
Asset Management
[SPSL-4661] - Fixed an issue with Password Change for a PostgreSQL database due to an assembly loading error.
[SPSL-5076] - Fixed an issue in Sectona PuTTY related to SSO for specific type of Cisco Switch.
[SPSL-5003] - Fixed an issue in asset Bulk Update for asset database instances property.
General
[SPSL-5148] - Fixed an issue related wrong operating system details in logs when user login from Windows 11.
Policies
[SPSL-5167] - Fixed an issue with enforcing JIT policy for user session that has Windows Monitoring configured on target Windows asset.
Reports and Dashboard
[SPSL-4952] - Fixed an issue with logo misalignment in the exported PDF report Header and Footer as per configuration.
Session Management
[SPSL-4945] - Fixed an issue for Over Browser sessions showing error as “Invalid session” randomly.
[SPSL-5127] - Fixed an issue related to SSHD Proxy session with Invalid Key format.
[SPSL-3003] - Fixed an issue with access an Asset within an RDP Over Browser session when its Primary IP is set to IPv6.
[SPSL-4767] - Fixed an issue for text alignment/rendering in SSH Over Browser sessions.
[SPSL-5037] - Fixed an issue for keyboard response and cursor behaviour when accessing a vSphere Console asset through an RDP over browser session via a Jump Server.
[SPSL-5039] - Fixed an issue for Google Chrome and Microsoft Edge browser-based sessions routing through the Windows local proxy.