Skip to content

User Manual

Introduction

This guide explains how to register for and use the Excalibur system as a User.

As a User, you will use the Excalibur system to securely log in and access company resources, such as PC clients, VPNs, and web applications. You will use the Excalibur mobile app as your personal security token to access the Dashboard and manage your sessions.

The Dashboard is your central hub, where you can find your profile and access your assigned PAM resources. From here, you can start new sessions, review recordings of past sessions, and search for text within those recordings.

Info

The features available to you in the Dashboard depend on how the Excalibur system is configured at your organization. This guide focuses on the standard features available to the User role.

Excalibur Mobile Application

Before you can use Excalibur, you need to install the mobile app. You can find links to the app stores in your email invitation, on the registration page, or at https://getexcalibur.com.

Overview

The app's main screen provides a simple interface for scanning QR codes to log in. From here, you can also access your settings to manage your accounts.

image

Figure 1. Excalibur mobile app main screen

Settings

To access the settings menu, tap the gear icon in the bottom-right corner. This menu allows you to manage your accounts and app preferences.

image

Figure 2. Excalibur mobile app settings

Companies

In the settings menu, tap on Excalibur to expand the list of the companies you are registered with.

image

Figure 3. Excalibur mobile app companies

Select a company name to view its details, including the server address, your registered accounts, and the tenants you can access.

image

Figure 4. Excalibur mobile app company details

Info

  • Your registered accounts are sorted by tenant.
  • You can tap on a username to copy it to your clipboard for quick sharing.

To remove an account, tap the Delete button.

Info

If you delete an account while offline, the action is saved and will be completed automatically once your device reconnects to the internet. This ensures that your changes are not lost.

General Settings

In this section, you can customize the app's behavior by enabling or disabling Vibration for feedback and choosing whether to share Usage and diagnostics data.

Other

Language Change the app's display language.

Figure 5. Change app language: English or Slovak

Application Information View details about the app, including its Version, Contact Information, and Legal Information.

Figure 6. Application information: Version, Contact Information and Legal Information

Registration

Registration creates a secure link between the Excalibur app on your phone and your company's Excalibur system. To begin, a system administrator will send you an invitation email.

Before you start, you will need:

  1. Your company domain account and email address.
  2. Your company account password.
  3. Access to your email account.
  4. The Excalibur v4 mobile app installed on your device.

Ensure your device meets the minimum system requirements for the best performance.

Steps:

  1. Open the invitation email from your system administrator. It contains a unique, time-limited registration link. Click the link or copy it into your web browser to get started.

    Figure 7. Email invitation

  2. On the registration page, enter your company account password and click Register.

    image

    Info

    The Excalibur app is available on Google Play Store, Apple App Store, and Huawei AppGallery. Click the appropriate icon to download.

  3. After your password is verified, a unique QR code will appear on the screen.

    image

  4. Open the Excalibur v4 app on your phone. If it's your first time using it, the app will ask for permission to use your camera. Allow access so you can scan the QR code.

  5. Check that your registration details in the app are correct, then confirm.

  6. Tap Register and allow the app to access your location. This is used as an additional security measure.

  7. To finish, create a PIN or set up biometrics (like a fingerprint or Face ID), depending on your phone's features.

  8. You are now registered!

Login

The Excalibur app is your security key for passwordless login. Follow these steps to log in to the Dashboard using the Excalibur app:

  1. Go to the Excalibur Dashboard login page, where you will see a QR code.
  2. Open the Excalibur app on your phone and scan the QR code.
  3. If you have multiple accounts, select the one you want to use.
  4. Confirm the login on your phone using your PIN or biometrics.
  5. You will be logged in to the Dashboard automatically.

Excalibur supports several login methods, but you must use the online QR code method described above to access the Dashboard.

Figure 8. Dashboard login screen

Figure 9. A successful login confirmation.

Dashboard

The Dashboard is the primary web interface for all users of the Excalibur system. It is used for managing your profile, accessing PAM resources, and reviewing your activity.

Info

In the Dashboard, every list allows you to filter, sort, and search for items.

Overview

image

Figure 10. Dashboard views correspond to the user roles in the Excalibur system.

Tenant Selector

If you have access to multiple tenants, you can switch between them using the tenant selector in the top-right corner.

Figure 11. Select a tenant

User Profile

Click the user profile icon in the top-right corner to open a dropdown menu with the following options:

  • User Details
  • Preferences
  • Passkeys
  • Logout

image

Figure 12. User profile dropdown menu

User Details

Select your username from the User Profile menu to open your user details page.

image

Figure 13. User details page

Preferences

Select Preferences from the User Profile menu to open the Preferences page.

image

Figure 14. Preferences page

On this page, you can change the display language and switch between your assigned roles.

Language Selection

image

Figure 15. Preferences - Language selection

Role Switcher

image

Figure 16. Preferences - Role switcher

You can switch between the different roles you have access to. Your available roles are displayed in the Role box.

Passkeys

Select Passkeys from the User Profile menu to open the Passkeys page.

Passkeys are a simple and secure way to log in without a password. Instead of a password, you use your device (with a fingerprint, face scan, or PIN) to prove it's you. Each Passkey is unique to your account and is stored securely on your device, in a third-party app, or on a hardware key like a YubiKey.

image

Figure 17. Select Passkeys

Create a Passkey

To create a new Passkey, click the plus button.

image

Figure 18. Click the plus button to create a Passkey

Give your Passkey a descriptive name and a brief description of its purpose, then click Confirm.

image

Figure 19. Create a Passkey

After creating a Passkey, you can see it in your Passkeys list, which shows its name, description, usage count, and creation date.

image

Figure 20. Passkeys list

Once a Passkey has been added, you can log out and use it to log back in.

Login with Passkey

From the login screen, instead of scanning the QR code, click LOGIN WITH PASSKEY and follow the prompts on your device to log in to the Dashboard.

Figure 21. Click LOGIN WITH PASSKEY on the Login screen

Figure 22. Login with Passkey

After completing these steps, you will be successfully logged in to the Dashboard.

Passkey Audit Logs

Info

Audit logs are available only for users with the Auditor or Administrator role.

Users with the appropriate permissions can view the audit logs for their Passkeys by clicking a Passkey on the Passkeys settings page.

image

Figure 23. Passkey Audit logs

Logs

The user can have quick access to Error and Warning Logs in the profile menu.

image

Figure 24. Access to Logs in the profile menu

Info

  • Logs older than 30 days are automatically deleted.
  • Logs are stored in the browser with persistent, keep them available even after page reloads.

The Logs icon shows the number of current logs. Clicking the Logs icon opens a drawer displaying only error and warning logs.

image

Figure 25. Clicking the Logs display error and warning logs

Users can filter the view to show only errors or only warnings

image

Figure 26. Filter the view to show only errors or only warnings or all

Each log entry includes copy and delete buttons.

image

Figure 27. Each log entry includes copy and delete buttons

You can also clear all the log entries by a "clear" button at the bottom.

image

Figure 28. Clear all log entries

Logout

Select Logout from the User Profile menu to log out of the Dashboard.

Overview

The navigation panel on the left contains several sections. This document focuses on the User role, which has access to the following:

  • Management: Actions, Authenticators, PAM
  • Settings: System, About

image

Figure 29. Navigation side panel

Breadcrumbs show the path to your current location within the Dashboard.

image

Figure 30. Navigation breadcrumbs

The navigation panel is expanded by default. To save space, you can collapse it by clicking the "menu" icon.

image

Figure 31.1. Navigation side panel - expanded

image

Figure 31.2. Navigation side panel - collapsed

Figure 31. Navigation side panel

Management - Actions

Overview

This page shows a detailed history of your activity in the system, including authentications, authorizations, and registrations.

image

Figure 32. Actions overview

To see more details about a specific action, click on it. A side panel will open with information organized into the General, Location, and Validation Result tabs.

General Tab

Figure 33. Action authentication - General

Location Tab

Figure 34. Action authentication - Location: Map view (names have been blurred)

Figure 35. Action authentication - Location: Satellite view (names have been blurred)

Validation Result Tab

The Validation Result tab shows all the security policies that were checked for the action. Each policy is displayed in an expandable section. When you expand a section, you will see all the rules within that policy. Rules that were met are marked with a green checkmark, while rules that were not met have a red cross.

Each policy also displays additional details like the date and time, the phone’s IP address, and its connection status. By default, all accordions are expanded for easy viewing.

image

Figure 36. Action authentication - Validation result

Management - Authenticators

This section lists all your registered security tokens (your mobile devices) and provides general information about them.

image

Figure 37. Token overview

Clicking on a token opens its details page.

image

Figure 38. Token details

Management - PAM

The PAM section is where you access secure company resources (PAM Targets). All sessions are recorded, and every action you take is digitally signed to ensure security and accountability.

Targets

Info

Long PAM target's name will be shortend with ... when it overflows. Hovering above the value will show the full content in a tooltip.

The Targets tab displays a list of all PAM targets you have permission to access.

Figure 39.PAM Targets

Possible Actions:

  • Connect to Target: Start a session with the selected PAM target. For detailed instructions, refer to the PAM Manual.
  • View Target Details: See more information about the selected PAM target.

Figure 40.1. General information about the PAM target

Figure 40.2. A list of all session recordings associated with the current PAM target.

Figure 40.PAM target details

Sessions

Sessions

The Sessions tab displays a list of your past and active PAM sessions. By default, all PAM sessions are logged for auditing purposes.

Possible Actions:

  • Play Recording: Replay the session recording.

  • Download Recording: Save a copy of the session recording to your computer as a .guac file.

  • Download Typescript: Export the session transcript as a Typescript file.

Clicking on a session opens its details page, where you can download the recording or transcript. This page also includes a "File Transfers" table that logs all files uploaded or downloaded during the session.

Figure 41. File transfers overview

You can view and download any files that were uploaded during your PAM sessions.

You can search for any text that was typed or displayed during your past PAM sessions.

Figure 42.PAM Full-Text Search

Enter a term in the search bar, and any sessions containing that term will appear. Click the "Play" button next to a session to watch the entire recording. To jump directly to the moment the searched term appeared, click the "Play" button within the search result details.

Example

Searching for mkdir shows a session with 5 occurrences.

Clicking the 'Play' action opens a preview of the session recording, highlighting where the searched term was found.

Settings - System

These system settings are view-only and are managed by your system administrator.

Server Settings

image

Figure 43. Server settings

Expiration Times

image

Figure 44. Expiration times

Map Settings

image

Figure 45. Map settings

Settings - About

This section shows the version information for the application's components.

image

Figure 46. About

Others

Tooltips

  • When column content exceeds the available width, it is truncated with “...”. The full value can be revealed by hovering, which displays a tooltip only if truncation occurs. This ensures tables remain tidy and easy to scan.

image

Figure 47. Tooltips


This guide is for informational purposes only. The functionality and capabilities of individual parts of the Excalibur system depend on the installation, configuration, and system administrators, and may change with updates.