Hardware and Software Requirements
WALLIX Access Manager 5.1.3.0 requires a minimum of 4GB RAM and 50GB
disk space. Contact the WALLIX Support Team if more information on sizing parameters is
required.
Any network equipment (proxy or firewall) positioned in front of WALLIX Access Manager must support
the WebSocket protocol.
The following versions of Web browsers can be used with Access Manager:
- Microsoft Edge, two latest stable versions
- Google Chrome, two latest stable versions
- Mozilla Firefox, two latest rapid releases and last extended support release (ESR)
WALLIX Support Team will provide a best-effort assistance on tickets related to the previous versions of
these browsers, with no obligation to achieve a fixed result.
- The design of the approval management workflow is responsive. The approver can then handle approval requests
from a mobile device through native browsers (iOS and Android: LTS versions of Google Chrome and Mozilla
Firefox).
Please refer to keyboard layouts for the list of supported keyboards.
WALLIX Access Manager 5.1.3.0 is compatible with WALLIX Bastion
versions listed in the compatibility matrix available here.
To ensure security and stability, we recommend that you always install the latest hotfix of
WALLIX Bastion.
Please also refer to Known Issues and Known
Limitations.
Notable changes
WAB-1: Session Invite for Invited Users via Access Manager
From WALLIX Bastion 10.4 and WALLIX Access Manager 4.4, Session Invite enables a user (called the host)
connected to WALLIX Access Manager to share their current RDP or VNC session with an external user (called the
guest)
who does not have a user account on WALLIX Access Manager or WALLIX Bastion. The guest is able to view the
host's session and optionally control it when the host has given them control. Session Invite offers auditing on
guest sessions, just like any other sessions.
WAB-1406: Upgrade of Elasticsearch
Upgrade Elasticsearch to version 8.13.4. As a result, some pages of the interface have been updated.
WAB-3405: Integrated SAML Workflow Between Access Manager and Bastion
From WALLIX Bastion 10.4 and WALLIX Access Manager 4.4, it is now possible to benefit from a complete SAML
workflow to identify and authenticate users by using the same SAML Identity Provider on both Bastion and Access
Manager.
WAB-4132: Access Manager Now Distributed as an Appliance
WALLIX Access Manager is no longer marketed as an installer. WALLIX Access Manager is available as one of the
following virtual environments: Alibaba Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP),
Kernel-based Virtual Machine (KVM), Microsoft Azure, Microsoft Hyper-V, Nutanix AHV, OpenStack, VMware vSphere.
WAB-6270: Universal Tunneling - Multi-Tunneling - Remote Access
Following the extension of Universal Tunneling with Multi-Tunneling on WALLIX Bastion, Multi-Tunneling is also
available on Access Manager to enable simultaneous access to up to 50 interfaces in the same session. The
opening of Universal Tunneling sessions has also been simplified.
WAB-6544: Troubleshooting Tool for Access Manager
Implementation of a troubleshooting tool. This tool will be used at the request of the WALLIX Support Team to
help retrieve information and analyze issues.
WAB-9105: Configuration of TCP Ports Per Bastion in Access Manager
To ease deployment of the WALLIX Access Manager in all network types, TCP ports of WALLIX Bastion services
(HTTPS,
SSH, RDP) can be set: these configuration options are available in the advanced options for each configured
Bastion on the WALLIX Access Manager.
WAB-9889: Dependency Upgrades
Update of the following dependencies: jetty, bouncycastle, commons-codec, commons-configuration,
commons-fileupload, commons-lang3, guava, hibernate-validator, httpclient, jackson, jackson-core,
jackson-databind, log4j, jose4j, mysql-connector, opencsv, opensaml, tika-core, zip4j, ipadress, api-all, gwt,
gwt-maven-plugin, asm, javan FreeRDP.
Update of the following JS dependencies: React, webcomponents-lite.js, Xterm.js.
WAB-13606: New Default Mapping of Services (Admin, User, HA) and Network Interfaces:
Modifies the default behavior of network interface mapping.
The administration service, which gives access to all organizations, including the global organization, as
well as to the appliance configuration, remains the only mandatory service and is associated with the first
interface by default.
The high availability service becomes optional but must be associated with the second interface if the
service is activated.
The user service, giving access to all organizations except the global organization, becomes optional and
associated with the third interface by default.