Documentation

Excalibur v4

Enterprise-grade Streamed Access Management with Zero Trust Architecture

Platform Features

Comprehensive privileged access management built on Zero Trust principles

Secure Tunneling & Access

Industry-standard SSH tunneling with integrated visibility and complete audit trails.

Identity Management

Seamless integration with Active Directory, LDAP, SAML, and cloud identity providers.

Advanced Authentication

Passwordless MFA with biometrics, passkeys, hardware keys, and 4-eye principle enforcement.

Protocol Support

SSH, RDP, VNC, and web target streaming with proprietary VITRO technology.

Cloud-Native Architecture

Kubernetes-based platform with auto-scaling, multi-tenant isolation, and MSP readiness.

Monitoring & Compliance

Full session recording and playback with SIEM integration and role-based access controls.

The Dawn of Intent-Aware Access Security

Preemptive threat detection that stops attacks before they reach the target — powered by AI that understands purpose, not just patterns.

Merlin Detect — Real-time interception
Merlin Investigate — Agentic investigation
Privacy-first — No third-party LLMs
Explore Merlin AI

Architecture & Integration

Secure Tunneling Architecture

Integrated and external tunneling options for maximum flexibility

Identity Provider Integration

Seamless integration with AD, LDAP, and cloud identity providers

Multi-Tenant Design

MSP-ready with complete tenant isolation and resource management

Security & Authentication

4-Eye Principle

Dual-approval authentication for sensitive resources

Multi-Factor Authentication

Biometric, passkeys, and hardware security key support

Zero Trust Security

Complete isolation with smartphone integrity verification

Access & Management

Agentless HTML5 Access

Access from any device with no client installation required

Comprehensive API

Full API for automated provisioning and management

Monitoring & Audit

Complete session recording with SIEM integration

See Excalibur in Action

A selection of short product walkthroughs — more videos coming soon covering additional targets, authentication flows, and admin workflows. Want to see a specific topic? Let us know.

Platform Capabilities

Streamed Access Management

Isolation and real-time AI security — stop attacks before they reach the app.

Just-in-Time (JIT) Access

Request, approve, connect, revoke — ephemeral access with full auditability.

Tunneled Target Access

Reach PAM targets through the Excalibur tunnel — no direct network exposure.

Getting Started

User Registration

Completing enrollment on your phone and desktop.

Token-Based Login

Signing in to a workstation with a one-time token.

Passkey Authentication

Passwordless sign-in with biometrics and passkeys.

Grant Target Access

How to grant a user access to a PAM target.

Database Targets

MSSQL

Privileged access to Microsoft SQL Server targets with session recording.

Oracle

Privileged access to Oracle Database targets with session recording.

PostgreSQL

Privileged access to PostgreSQL targets with session recording.

Home

Excalibur s.r.o.

Hraničná 12

058 01 Poprad

Slovak Republic

Excalibur projects

Our projects are funded by the European Cybersecurity Competence Center (ECCC) and co-funded by the European Union.