Reference: | https://doc.wallix.com/en/bastion/12.1/rn-en-12.1.1.html |
---|---|
Date: | 2025-06-05 |
Copyright: | © 2025 WALLIX |
Contents
This version includes all the improvements and new features implemented from WALLIX Bastion 10.0 and listed in the sections below.
The following features and improvements have been implemented in this version:
API keys can be linked to a non-editable profile, restricting the rights of users logging in with an API key. New default non-editable profiles have been introduced to simplify API key configuration with Access Manager (compatibility starting from version 5.2).
Bastion supports OpenID Connect, enabling seamless authentication with identity providers supporting the standard. This integration enhances security and simplifies user access management. Administrators benefit from streamlined identity federation and improved access control. With Single Sign-On (SSO), users can access Bastion without repeatedly entering credentials.
The RDP session resolution can be enforced by the administrator through the RDP connection policy. This new option facilitates connections to servers and systems that support only a specific resolution, preventing display issues or session crashes.
In network and AD discovery, latency is now measured for each discovered devices and available in the scan job results.
The following features and improvements have been implemented in this version:
Bastion 12 introduces a new system upgrade procedure. As a result, if you have a WALLIX Bastion prior to version 12 and wish to upgrade to Bastion 12, refer to chapter 6 of the Deployment Guide.
Bastion 12 introduces a new minor upgrade process to enhance efficiency and user experience. The new process relies on the wabupgrade account making it easier to upgrade from version 12 to version 12.X. Refer to the Deployment Guide, chapter 7 for detailed instructions.
Bastion 12.0.1 introduces a new default behavior for the “Enable Kerberos” option, enabling it by default which means that NLA Kerberos is now the first attempted authentication method. However, when restoring the backup of a Bastion anterior to 12.0.1, the configuration of authentication mechanisms is not modified. That means that values set for NLA and Kerberos are restored as defined in that backup file. For example, if Enable Kerberos option was disabled, this option remains disabled after the restoration, even if the option is now enabled by default.
Bastion 12.0.1 also introduces new options for RDP target connections. To ensure that the target cannot negotiate an authentication protocol lower than that specified by the connection policy, fallback mechanisms are disabled by default. However, for greater granularity, you can modify fallback mechanisms for connections to RDP targets. The options are:
We strongly encourage you to review your connection policies and make any necessary updates to the fallback mechanism to better suit your needs.
WALLIX follows the Microsoft recommendation to use the domain account for RDP sessions. As a result, WALLIX recommends to use NLA Kerberos authentication when using target account in Active Directory. That means the “Allow NLA NTLM fallback”, “Allow TLS only fallback”, and “Allow RDP legacy fallback” options must be disabled.
When using a local account on a target, Microsoft and WALLIX recommend:
For earlier targets (windows 2003 and older), you must enable the “Allow RDP legacy fallback” option.
The following features and improvements have been implemented in this version:
WALLIX Bastion is now running on Debian 12. This evolution offers a more modern software ecosystem with functional enhancements and security improvements.
WALLIX Bastion now features a whole disk encryption support. This mechanism is automatically set up during the installation phase. To customize several security parameters of the encryption, refer to section 6.3 of the Operation Guide.
The following features and improvements have been implemented in this version:
My Authorizations pages have been reworked. Users are now able to resize, reorder, display or hide columns according to their news. New columns are available and column filter is now available for most of them. Users can now choose their default SSH or RDP client in Preferences.
My Authorizations pages have been reworked. Passwords has been renamed Secrets and all improvements available on Sessions page are also available for Secrets. The checkout workflow has been cleaned, secrets can be displayed or added to clipboard and two new SSH key formats are also available : PEM/PKCS1 & PKCS8.
WALLIX Bastion and WALLIX Access Manager are now supported on Alibaba Cloud. Images can be requested from the WALLIX Support team. For WALLIX Bastion, support is available since version 10.0.2 and for all higher versions supported. For WALLIX Access Manager, support is available since version 4.0.3 and for all higher versions supported.
Universal Tunneling (RAWTCPIP) is extended to enable simultaneous access up to 50 interfaces in the same session. Numerous IT and OT machines require fat clients to access several interfaces at the same time to be efficiently administrated. Thanks to Multi-Tunneling, it's possible with one session and one approval request. And with Seamless Connection, there is no extra effort for the user.
In Session invite, the host user can now cancel sharing the session with the guest at any time by clicking a button. The management of guest sessions has been improved so that they are properly closed when the guest logs out or is disconnected and are properly counted with respect to the maximum number of concurrent users configured in the license. In addition, when a guest accesses Access Manager using a shared URL, a "Login with OTP" action is now recorded in the audit logs, regardless of whether the authentication is successful.
With the new parameters in the RAWTCPIP connection policy, it is now possible to access targets behind Network Address Translation (NAT) solutions using Universal Tunneling sessions, without any inconvenience to privileged users.
My Authorizations pages have been reworked! Approval requests benefit now from their own page. As for other My Authorizations pages, a lot of improvments are available making it easier for to browse approval requests.
A new section 12.7 regarding Universal Tunneling (RAWTCPIP) sessions has been introduced in the documentation. This section presents the main use cases, prerequisites, some specific options and main configuration examples.
The following features and improvements have been implemented in this version:
Session invite allows a user (called host) connected to WALLIX Access Manager to share a URL their current RDP or VNC session with an external user (called guest) who does not have a user account on WALLIX Access Manager or WALLIX Bastion. Once connected, the guest is able to view the host's session and optionally to control it when the host has given them control. Session invite includes audit of guest sessions, as for any session.
The WindowsService secret rotation plugin provides a new integrated workflow for rotating passwords for AD or LDAP accounts and propagating them to targets (called references) that use a service account for one of their services. Now all Windows service and user accounts can be managed with a single domain. SIEM logs are generated for each rotation and propagation to monitor the results of the password rotation.
With WALLIX Bastion 10.4 and WALLIX Access Manager 4.4, it is now possible to benefit from a complete SAML workflow to identify and authenticate users using the same SAML Identity Provider on Bastion and Access Manager.
The following features and improvements have been implemented in this version:
The standard protocol SAML 2.0 is now supported in the WALLIX Bastion. WALLIX Bastion can be now configured as a Service Provider (SP) so that any SAML Identity Providers (IdP) can be leveraged to manage federated identities and strong authentication of privileged users.
Authentication of LDAP/AD users with SSH certificates is now supported. SSH certificates are an improvement of the SSH keys mechanism that eases and rationalizes the management of SSH authentication. A new SSH Certificate Authorities (CA) object has been introduced. In the future, this object will be extended to centralize and simplify the management and use of other types of CAs in the WALLIX Bastion.
The configuration page of the authorizations ("Manage authorizations") has been redesigned to clarify the configuration of one of the most important objects in the Bastion: the order of the parameters has been rearranged and descriptions have been added. The "Enable sessions" and "Enable password checkout" rights has been reorganized into the same parameter with the "Sessions" and "Secrets" value. A new list of authorizations is also available.
This version includes all fixes implemented from WALLIX Bastion 11.0 and listed in the sections below.