Skip to main content
Skip table of contents

Version 5.5.0

Introduction

This document provides information on the new features, improvements and the fixed issues in the Version 5.5.0.

What’s New?

Session Management

  • [SPSL-3247] - Added a feature to allow access to accounts not managed by the Sectona Security Platform called Unvaulted Accounts.

  • [SPSL-5012] - Added a feature to capture Network Activity (queries/metadata) Log for database sessions accessed via Thick Client.

  • [SPSL-5107] - Added asset security configuration to remove old authorized SSH public key file after every SSH key rotation on the Unix Target Server.

  • [SPSL-5040] - Added scaling option in user setting for RDP Over Browser screen rendering.

  • [SPSL-4572] - Added restrictions to inhibit direct access to Unix servers with a Unix Monitoring Agent (UMON).

  • [SPSL-5005] - Added an option to open “Duplicate Tab” within a launcher for browser session.

  • [SPSL-5019] - Enhanced SSHD session security with Session Lockout and Enforce MFA every session.

  • [SPSL-5132] - Added support to route SSHD Proxy based sessions through the session proxy servers.

  • [SPSL-5161] - Removed the reconnect option from the RDP and SSH Over Browser sessions.

  • [SPSL-5162] - SSHD & RDPD proxy servers will auto start on Primary P2 and Application proxy nodes.

  • [SPSL-5009] - Added file download details for browser-based sessions in meatdata logs.

  • [SPSL-4668] - Added Activity Logs for App Services which include details about the Timestamp, System Nodes and Log Description.

  • [SPSL-4929] - Added new configuration parameters to restrict App Service to run between specific timeframes.

  • [SPSL-5025] - Added a feature to view user status change trail and MFA reset trail.

  • [SPSL-4645] - Added support for IMAP (including IMAP-TLS/IMAP-SSL protocols) with respect to incoming email gateway.

  • [SPSL-5063] - Added Oauth 2.0 as optional authentication for system management API authentication. [Currently supported basic authentication will be deprecated in upcoming versions.]

Account Management

  • [SPSL-5043] – Added support to identify asset in Database including Windows and Unix asset types for an AD Sync service.

  • [SPSL-4930] – Improve performance and reduced time in AD Sync service

  • [SPSL-4563] – Included password policy, password manager job information (auto or manually) in account activity graph

Event, Monitoring & Notification

  • [SPSL-4664] - Added notifications and event to update changes in user status depending on whether the User is Active, Disabled, Locked, Dormant, Unlock.

  • [SPSL-4665] – Added notifications and event for user deletion.

  • [SPSL-4667] - Added notifications and event for asset and account deletion.

  • [SPSL-4669] - Added notifications for System Vault Backup Failed and System Vault Backup Success.

  • [SPSL-5034] - Added details within the notification email about Account Type with its respective credential type for Workflow Approved - Password notification template.

  • [SPSL-5166] - Added asset IP address content tag for workflow notifications template.

  • [SPSL-5008] - Added notifications and event Password Checkout and Concurrent Sessions Started.

Asset Management

  • [SPSL-5149] - Added Preferred Host Key Algorithms, Use Legacy Group Exchange and Allow Keyboard Interaction in asset security settings primarily for Unix based assets.

  • [SPSL-5017] – Added “Enforce Host Name for Connection” option in asset configuration to use hostname instead of IP address.

  • [SPSL-5059] - Added new asset type as Azure Entra ID with password rotation support.

Discovery

  • [SPSL-4672] - Added Windows (RDP) and Unix (SSH) custom port option in Network Scan for Asset Discovery.

  • [SPSL-4570] - Added support for Unix based operating system to act as Session Proxy. Based on configuration, system will route all asset and account related transactions via session proxy.

  • [SPSL-5004] – Added AD “Group Name” as a mandatory configuration in account discovery when Auto Onboarding is set to 'Yes'.

Configuration

  • [SPSL-5021] - Added option to customise the Login page depending on the Login Type by changing appearance settings.

  • [SPSL-5146] - Added LDAPS support to Browse AD & Directory Store.

User Management

  • [SPSL-5126] - Added “Custom Attribute 1” and “Custom Attribute 2” in user configuration, same will be available in workflow configuration as additional user attribute.

  • [SPSL-4633] - Added a feature to copy User Profile during user creation including license assignment and access entitlements.

  • [SPSL-5011] - Added support to send email notification to user before changing user status to dormant.

  • [SPSL-4632] - Deprecated and removed Sectona App OTP as a Multi-Factor Authentication feature.

Workflow

  • [SPSL-3300] - Added support to raise a ticket on external ITSM/Service Desk when workflow request raised in the system.

  • [SPSL-4932] - Added out of box integration for Motadata as a Service Desk system.

  • [SPSL-1724] - Enhanced support for Service Desk Ticket closure when a user disconnects browser-based sessions.

Reporting and Dashboard

  • [SPSL-4754] - Added ISO/IEC 27001: 2022 compliance reports under analytics.

  • [SPSL-5142] - Added system defined report for Unmanaged Assets.

Policies

  • [SPSL-5117] – Added option to add multiple Just-In-Time profiles based on asset type in single Asset JIT Policy.

 

Fixed Issues

Asset Management

  • [SPSL-4661] - Fixed an issue with Password Change for a PostgreSQL database due to an assembly loading error.

  • [SPSL-5076] - Fixed an issue in Sectona PuTTY related to SSO for specific type of Cisco Switch.

  • [SPSL-5003] - Fixed an issue in asset Bulk Update for asset database instances property.

General

  • [SPSL-5148] - Fixed an issue related wrong operating system details in logs when user login from Windows 11.

Policies

  • [SPSL-5167] - Fixed an issue with enforcing JIT policy for user session that has Windows Monitoring configured on target Windows asset.

Reports and Dashboard

  • [SPSL-4952] - Fixed an issue with logo misalignment in the exported PDF report Header and Footer as per configuration.

Session Management

  • [SPSL-4945] - Fixed an issue for Over Browser sessions showing error as “Invalid session” randomly.

  • [SPSL-5127] - Fixed an issue related to SSHD Proxy session with Invalid Key format.

  • [SPSL-3003] - Fixed an issue with access an Asset within an RDP Over Browser session when its Primary IP is set to IPv6.

  • [SPSL-4767] - Fixed an issue for text alignment/rendering in SSH Over Browser sessions.

  • [SPSL-5037] - Fixed an issue for keyboard response and cursor behaviour when accessing a vSphere Console asset through an RDP over browser session via a Jump Server.

  • [SPSL-5039] - Fixed an issue for Google Chrome and Microsoft Edge browser-based sessions routing through the Windows local proxy.

 

 

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.