User Manual¶
Introduction¶
This guide explains how to register for and use the Excalibur system as a User.
As a User, you will use the Excalibur system to securely log in and access company resources, such as PC clients, VPNs, and web applications. You will use the Excalibur mobile app as your personal security token to access the Dashboard and manage your sessions.
The Dashboard is your central hub, where you can find your profile and access your assigned PAM resources. From here, you can start new sessions, review recordings of past sessions, and search for text within those recordings.
Info
The features available to you in the Dashboard depend on how the Excalibur system is configured at your organization. This guide focuses on the standard features available to the User role.
Excalibur Mobile Application¶
Before you can use Excalibur, you need to install the mobile app. You can find links to the app stores in your email invitation, on the registration page, or at https://getexcalibur.com.
Overview¶
The app's main screen provides a simple interface for scanning QR codes to log in. From here, you can also access your settings to manage your accounts.
Figure 1. Excalibur mobile app main screen
Settings¶
To access the settings menu, tap the gear icon in the bottom-right corner. This menu allows you to manage your accounts and app preferences.
Figure 2. Excalibur mobile app settings
Companies¶
In the settings menu, tap on Excalibur
to expand the list of the companies you are registered with.
Figure 3. Excalibur mobile app companies
Select a company name to view its details, including the server address, your registered accounts, and the tenants you can access.
Figure 4. Excalibur mobile app company details
Info
- Your registered accounts are sorted by tenant.
- You can tap on a username to copy it to your clipboard for quick sharing.
To remove an account, tap the Delete button.
Info
If you delete an account while offline, the action is saved and will be completed automatically once your device reconnects to the internet. This ensures that your changes are not lost.
General Settings¶
In this section, you can customize the app's behavior by enabling or disabling Vibration
for feedback and choosing whether to share Usage and diagnostics
data.
Other¶
Language Change the app's display language.
Figure 5. Change app language: English or Slovak
Application Information
View details about the app, including its Version
, Contact Information
, and Legal Information
.
Figure 6. Application information: Version, Contact Information and Legal Information
Registration¶
Registration creates a secure link between the Excalibur app on your phone and your company's Excalibur system. To begin, a system administrator will send you an invitation email.
Before you start, you will need:
- Your company domain account and email address.
- Your company account password.
- Access to your email account.
- The Excalibur v4 mobile app installed on your device.
- Android: Google Play Store (Requires Android 7.0 - Nougat or higher)
- iOS: App Store (Requires iOS 15.6 or higher)
- Huawei: AppGallery
Ensure your device meets the minimum system requirements for the best performance.
Steps:
-
Open the invitation email from your system administrator. It contains a unique, time-limited registration link. Click the link or copy it into your web browser to get started.
Figure 7. Email invitation
-
On the registration page, enter your company account password and click Register.
Info
The Excalibur app is available on Google Play Store, Apple App Store, and Huawei AppGallery. Click the appropriate icon to download.
-
After your password is verified, a unique QR code will appear on the screen.
-
Open the Excalibur v4 app on your phone. If it's your first time using it, the app will ask for permission to use your camera. Allow access so you can scan the QR code.
-
Check that your registration details in the app are correct, then confirm.
-
Tap Register and allow the app to access your location. This is used as an additional security measure.
-
To finish, create a PIN or set up biometrics (like a fingerprint or Face ID), depending on your phone's features.
-
You are now registered!
Login¶
The Excalibur app is your security key for passwordless login. Follow these steps to log in to the Dashboard using the Excalibur app:
- Go to the Excalibur Dashboard login page, where you will see a QR code.
- Open the Excalibur app on your phone and scan the QR code.
- If you have multiple accounts, select the one you want to use.
- Confirm the login on your phone using your PIN or biometrics.
- You will be logged in to the Dashboard automatically.
Excalibur supports several login methods, but you must use the online QR code method described above to access the Dashboard.
Figure 8. Dashboard login screen
Figure 9. A successful login confirmation.
Dashboard¶
The Dashboard is the primary web interface for all users of the Excalibur system. It is used for managing your profile, accessing PAM resources, and reviewing your activity.
Info
In the Dashboard, every list allows you to filter, sort, and search for items.
Overview¶
Figure 10. Dashboard views correspond to the user roles in the Excalibur system.
Tenant Selector¶
If you have access to multiple tenants, you can switch between them using the tenant selector in the top-right corner.
Figure 11. Select a tenant
User Profile¶
Click the user profile icon in the top-right corner to open a dropdown menu with the following options:
- User Details
- Preferences
- Passkeys
- Logout
Figure 12. User profile dropdown menu
User Details¶
Select your username from the User Profile menu to open your user details page.
Figure 13. User details page
Preferences¶
Select Preferences from the User Profile menu to open the Preferences page.
Figure 14. Preferences page
On this page, you can change the display language and switch between your assigned roles.
Language Selection¶
Figure 15. Preferences - Language selection
Role Switcher¶
Figure 16. Preferences - Role switcher
You can switch between the different roles you have access to. Your available roles are displayed in the Role box.
Passkeys¶
Select Passkeys from the User Profile menu to open the Passkeys page.
Passkeys are a simple and secure way to log in without a password. Instead of a password, you use your device (with a fingerprint, face scan, or PIN) to prove it's you. Each Passkey is unique to your account and is stored securely on your device, in a third-party app, or on a hardware key like a YubiKey.
Figure 17. Select Passkeys
Create a Passkey¶
To create a new Passkey, click the plus button.
Figure 18. Click the plus button to create a Passkey
Give your Passkey a descriptive name and a brief description of its purpose, then click Confirm.
Figure 19. Create a Passkey
After creating a Passkey, you can see it in your Passkeys list, which shows its name, description, usage count, and creation date.
Figure 20. Passkeys list
Once a Passkey has been added, you can log out and use it to log back in.
Login with Passkey¶
From the login screen, instead of scanning the QR code, click LOGIN WITH PASSKEY and follow the prompts on your device to log in to the Dashboard.
Figure 21. Click LOGIN WITH PASSKEY
on the Login screen
Figure 22. Login with Passkey
After completing these steps, you will be successfully logged in to the Dashboard.
Passkey Audit Logs¶
Info
Audit logs are available only for users with the Auditor or Administrator role.
Users with the appropriate permissions can view the audit logs for their Passkeys by clicking a Passkey on the Passkeys settings page.
Figure 23. Passkey Audit logs
Logs¶
The user can have quick access to Error and Warning Logs in the profile menu.
Figure 24. Access to Logs in the profile menu
Info
- Logs older than 30 days are automatically deleted.
- Logs are stored in the browser with persistent, keep them available even after page reloads.
The Logs icon shows the number of current logs. Clicking the Logs icon opens a drawer displaying only error and warning logs.
Figure 25. Clicking the Logs display error and warning logs
Users can filter the view to show only errors or only warnings
Figure 26. Filter the view to show only errors or only warnings or all
Each log entry includes copy and delete buttons.
Figure 27. Each log entry includes copy and delete buttons
You can also clear all the log entries by a "clear" button at the bottom.
Figure 28. Clear all log entries
Logout¶
Select Logout from the User Profile menu to log out of the Dashboard.
Navigation Side Panel¶
Overview¶
The navigation panel on the left contains several sections. This document focuses on the User role, which has access to the following:
- Management: Actions, Authenticators, PAM
- Settings: System, About
Figure 29. Navigation side panel
Navigation Breadcrumbs¶
Breadcrumbs show the path to your current location within the Dashboard.
Figure 30. Navigation breadcrumbs
The navigation panel is expanded by default. To save space, you can collapse it by clicking the "menu" icon.
Figure 31. Navigation side panel
Management - Actions¶
Overview¶
This page shows a detailed history of your activity in the system, including authentications, authorizations, and registrations.
Figure 32. Actions overview
To see more details about a specific action, click on it. A side panel will open with information organized into the General, Location, and Validation Result tabs.
General Tab¶
Figure 33. Action authentication - General
Location Tab¶
Figure 34. Action authentication - Location: Map view (names have been blurred)
Figure 35. Action authentication - Location: Satellite view (names have been blurred)
Validation Result Tab¶
The Validation Result tab shows all the security policies that were checked for the action. Each policy is displayed in an expandable section. When you expand a section, you will see all the rules within that policy. Rules that were met are marked with a green checkmark, while rules that were not met have a red cross.
Each policy also displays additional details like the date and time, the phone’s IP address, and its connection status. By default, all accordions are expanded for easy viewing.
Figure 36. Action authentication - Validation result
Management - Authenticators¶
This section lists all your registered security tokens (your mobile devices) and provides general information about them.
Figure 37. Token overview
Clicking on a token opens its details page.
Figure 38. Token details
Management - PAM¶
The PAM section is where you access secure company resources (PAM Targets). All sessions are recorded, and every action you take is digitally signed to ensure security and accountability.
Targets¶
Info
Long PAM target's name will be shortend with ...
when it overflows. Hovering above the value will show the full content in a tooltip.
The Targets tab displays a list of all PAM targets you have permission to access.
Figure 39.PAM Targets
Possible Actions:
- Connect to Target: Start a session with the selected PAM target. For detailed instructions, refer to the PAM Manual.
- View Target Details: See more information about the selected PAM target.
Figure 40.1. General information about the PAM target
Figure 40.2. A list of all session recordings associated with the current PAM target.
Figure 40.PAM target details
Sessions¶
Sessions¶
The Sessions tab displays a list of your past and active PAM sessions. By default, all PAM sessions are logged for auditing purposes.
Possible Actions:
-
Play Recording: Replay the session recording.
-
Download Recording: Save a copy of the session recording to your computer as a
.guac
file. - Download Typescript: Export the session transcript as a Typescript file.
Clicking on a session opens its details page, where you can download the recording or transcript. This page also includes a "File Transfers" table that logs all files uploaded or downloaded during the session.
Figure 41. File transfers overview
You can view and download any files that were uploaded during your PAM sessions.
Full-Text Search¶
You can search for any text that was typed or displayed during your past PAM sessions.
Figure 42.PAM Full-Text Search
Enter a term in the search bar, and any sessions containing that term will appear. Click the "Play" button next to a session to watch the entire recording. To jump directly to the moment the searched term appeared, click the "Play" button within the search result details.
Example
Searching for mkdir
shows a session with 5 occurrences.
Clicking the 'Play' action opens a preview of the session recording, highlighting where the searched term was found.
Settings - System¶
These system settings are view-only and are managed by your system administrator.
Server Settings¶
Figure 43. Server settings
Expiration Times¶
Figure 44. Expiration times
Map Settings¶
Figure 45. Map settings
Settings - About¶
This section shows the version information for the application's components.
Figure 46. About
Others¶
Tooltips¶
- When column content exceeds the available width, it is truncated with “...”. The full value can be revealed by hovering, which displays a tooltip only if truncation occurs. This ensures tables remain tidy and easy to scan.
Figure 47. Tooltips
This guide is for informational purposes only. The functionality and capabilities of individual parts of the Excalibur system depend on the installation, configuration, and system administrators, and may change with updates.