Privx Datasheet: Zero Trust Access Management
Privx Datasheet: Zero Trust Access Management
®
Zero Trust Access Management
What is PrivX?
PrivX is an access management gateway
that is fast to deploy and simple to
maintain. PrivX advances your security by
allowing connections for only the amount
of time needed, removing dependency
on passwords, controlling access to both
cloud-hosted and on-premises applications,
and interfacing directly with your identity
management system.
SSH.COM
2 PrivX®
• Integration with widely used ID data • Connect and stay in sync with
services existing AD/LDAPs and other ID
• No agents to install and maintain data services
• No passwords to vault, rotate and • SSO logins with multi-factor
manage authentication (MFA)
• Scalable microservices architecture • Automatic cloud host discovery
SSH.COM
PrivX®
3
Privileged access
re-imagined
PrivX stands apart from traditional privileged access management
(PAM) tools by delivering a lean, cost effective solution. Compared
to legacy PAMs, PrivX helps you to:
Economize on
deployment and
maintenance efforts
by avoiding the use of
agents on your client
workstations and hosts.
Ephemeral certificates
Over SSH/RDP connections
PAMs are expensive to As workloads move to the People will find ways to
deploy and maintain cloud, security concerns avoid difficult systems
rise
Traditional PAMs require heavy You need your access
resources to deploy and manage. As organizations take advantage management tool to be easy so
Tasks include installing and of the economy that cloud people will use it. Astute users
updating agents on workstations hosting offers, security concerns can find ways to bypass heavier
as well as vaulting and rotating also mount. Chief among these is tools, like traditional PAMs.
passwords. PAMs can take months managing access to sensitive data
and even years to install, and that reside in the cloud.
some are abandoned before full
deployment.
Meeting internal and regulatory Not only are insider attacks a Your administrators have a lot
requirements can be onerous. You threat, but the clever hacker who on their plates. They need easy-
need to demonstrate that your does gain access to your network to-use security tools so they
systems are under control and that can move among your systems can spend their time on more
unwarranted users are kept out of if un-checked at access points. productive activities.
your servers. It’s not enough to control your
perimeter; you need to control
access inside network.
SSH.COM
6 PrivX®
PrivX: A modern
solution for
modern problems
PrivX helps you solve your access management problems cost
effectively, securely, and in a package that your administrators will
find easy to use.
Microservices
Recorded sessions with Hybrid and multi-cloud architecture for
playback support
scalability and high
Make easy work of preparing for PrivX manages access to target hosts
whether they’re in AWS, Azure, GCP
availability
audits, as well as post-event forensics.
All access traffic is recorded and stored cloud environments, or all three as well PrivX lets you easily add instances as your
for review. PrivX collects audit events as private cloud and on-premises. needs grow, while also providing high
which can be sent to SIEMs for user availability for disaster recovery. Your
and entity behavior analytics (UEBA). multiple, distributed PrivX instances can
and other analysis. be dispatched through a common load
balancer and connected to a backend
database to run as a unified, highly
*Available as agentless or with agents. available system.
SSH.COM
PrivX®
7
FEATURES
Short-lived certificate-based authentication
Role-based access control to target hosts Users can be dynamically mapped to roles
View hosts that are accessible by specific roles
Users and groups synced with Microsoft AD, Azure AD
Directory service integration via Graph API, Google G Suite, LDAP and OpenID Connect
providers (e.g. AWS Cognito, Okta, Ubisecure)
• Single sign on (SSO) through directory services applications
via Kerberos
• Username & password for local users
Sign-in and access control to PrivX
• Multi-factor authentication (MFA), time-based one-time
password (TOTP)
• OAuth2 over TLS
• OpenSSH certificate
• Virtual Smart Card for RDP
Authentication to target hosts
• Stored, vaulted credentials
• Username & password
Fast and responsive user experience HTML5 single page UI over REST APIs
Complete HTTP REST API Anything the UI does can be executed via the API
PERFORMANCE
100 000 users mapped to roles
Capacity
10 000 target hosts
10 000 SSH, 60 new RSA connections per second
200 RDP connections
Concurrent connections
Tested on a 3.6GHz 8-core server with 16 GB of RAM, scales
horizontally as needed
PRIVX INSTANCE
Red Hat Enterprise Linux 7.4 or later
Compatible operating systems
CentOS 7.4 or later
SSH.COM
8 PrivX®
HARDWARE REQUIREMENTS
Evaluation/trial license (<10k users) Recommended minimum: 4GB RAM, 2 core CPU, 15GB disk space
Production license (<100k users) Recommended minimum: 8GB RAM, 8 core CPU, 100GB disk space
DEPLOYMENT
• High availability through active-active cluster nodes
High availability and scaling • Horizontal scaling by adding nodes
• Load balancing with sticky-session support
• Web-based admin UI
Management • HTTP REST API
• API end point status and service status page
All OpenSSH compatible hosts supported. Automated deployment
SSH target host configuration
scripts provided: CentOS, RedHat, Ubuntu, Debian, Amazon Linux.
Automated deployment Compatible with Ansible and Chef automated deployment tools
For detailed information on deployment and requirements, please refer to the Administrator Manual here.
AUDITING
All user and admin actions are persisted to log files and can be
Audit events persisted to log files
automatically directed to SIEM
View past and ongoing connections
Connection manager
Terminate ongoing connections
Record browser-based SSH and RDP connections. Store encrypted
Record and playback sessions
audit trails in your preferred location.
SECURITY
• Communication between service components and PrivX secured
via TLS
• Information stored in the vault encrypted with AES128 or AES256
System security
GCM
• PrivX secrets can be secured using hardware security modules
(HSMs)
System and connection-based alerts collected and sent to SIEMs
Alerts and reports
(e.g., Splunk, IBM Qradar), AWS CloudWatch or Azure Event Hubs
The information in this document is provided “as is” without any warranty, express or implied, including without any warranties of
merchantability, fitness for a particular purpose and any warranty or condition of non-infringement. SSH Communications Security products
are warranted according to the terms and conditions of the agreements under which they are provided. SSH Communications Security may
make changes to specifications and product descriptions at any time, without notice.
ssh®, PrivX®, Tectia®, Universal SSH Key Manager® and CryptoAuditor® are registered trademarks or trademarks of SSH Communications
Security Corporation and are protected by the relevant jurisdiction-specific and international copyright laws and treaties. Other names and
marks are the property of their respective owners. Copyright © 2019 SSH Communications Security Corporation. All rights reserved.
SSH.COM
PrivX®
9
www.ssh.com