Axidian has introduced the new version of Axidian Privilege 3.0—a Privileged Access Management (PAM) solution for managing privileged user access.
Among the most significant changes introduced in Axidian Privilege 3.0 are the new PostgreSQL Proxy component and an improved installation and configuration wizard. Additionally, now it is also possible to work with custom types of service connections.
To learn about all the new features in Axidian Privilege 3.0, read this article.
Proxying SQL Sessions For PostgreSQL
In Axidian Privilege 3.0, a new component has appeared—PostgreSQL Proxy. Now all SQL sessions are initiated via this component. This feature allows administrators to read text logs, which contain all SQL queries executed by a user. This provides greater control over sessions and simplifies incident investigation.
New Installation And Configuration Wizard
Axidian Privilege 3.0 introduces a new improved wizard for installation, update and configuration. Previously, a large number of parameters were set using configuration files, and now this is done in a user-friendly interface. Now, PAM installation, update and configuration are performed from a single point of system management, so the process has become easier and more convenient. This upgrade speeds up the Axidian Privilege configuration process and reduces the requirements for employees handling installation, updates, or configuration.

Operations With Custom Service Connection Types
It is now possible to create your own types of service connections. This allows you to perform service operations on new types of resources. This feature ensures strict control of privileged accounts on rare resource types that are often present in a corporate infrastructure.
Managing Windows Services
In Axidian Privilege 3.0 Management Console has been updated with a new section where administrators can manage all Windows services within the company infrastructure. Thus, passwords for accounts that run services are now updated automatically. After changing account passwords via PAM (both manually or by schedule), services will start with the updated credentials.
SSH Server Key Fingerprints Verification
Now SSH Key Fingerprints in Axidian Privilege are verified. Fingerprints are designed to verify the identity of a resource at the moment of connection. Using fingerprints helps protect the company infrastructure against MITM (Man in the Middle) attacks.
We’ve made Axidian Privilege even more secure!
Session Termination When User Is Inactive
In Axidian Privilege 3.0, sessions are automatically terminated if there is no user activity for a specified period of time. This feature allows you to release occupied session licenses that are not actually used.
Terminating unused sessions also frees up hardware resources and reduces the load on hosts where Axidian Privilege is installed.
Copying Permissions
PAM system administrators can now copy permissions, which allow users to connect to resources via privileged accounts. This feature allows you to create a permission based on a previously created one. When copying, administrators are asked to edit the selected objects from the original permission—add missing objects or remove unnecessary ones. This feature allows you to optimize the process of adding similar permissions since there is no need to configure the same set of objects multiple times.
Configuring Account Password Requirements
The new version of Axidian Privilege has expanded the list of requirements that can be applied both to automatically generated passwords and passwords entered manually.

This novation allows you to enhance password policy flexibility via Axidian Privilege to meet the security regulations within your company.
Information security specialists can rely on Axidian Privilege to ensure compliance with password policies.
RDP Sessions Without Local Disk Redirection
In the earlier versions of Axidian Privilege, when opening an RDP session it was obligatory to select a local disk to use it in the session.
Starting with Axidian Privilege 3.0, you can open RDP sessions with or without local disk redirection. Due to this update, you can now connect to a resource faster if there is no need to use the disk in the session.
Contact us to learn more about all the benefits of Axidian Privilege.