- SAML based Authentication for Uila login
With Uila uObserve, users can leverage SAML (Security Assertion Markup Language) based authentication for the Uila login. SAML is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. uObserve users can choose between the Database based 2FA authentication and SAML as shown below in the Accounts Management settings page. The Uila team has verified SAML support for OKTA and Azure AD at this time.
- Multi-tenant based Service Grouping
With this new release, Managed Service Providers or similar organizations can create tenant accounts within the Uila solution to visualize the multi-tier service groupings for their customers/users. The tenant users will only be able to visualize the VMs/servers that are assigned to them.
- New alarm: New Data Center Stats and Automated Phone/SMS Notification.
Users can now get alerted to situations where there is no connectivity observed from the Data Center to the Uila system. This can in most situations indicate Data Center outages..
- Server/Device Uptime report enhancement
The server/device uptime report has been enhanced to include the following information. 1. Addition of total number of VMs up and down at the end of report period. 2. Add VM uptime percentage for each VM. 3. Separation of VM from VM. 4. Sorting by Start Time in chronological order.
- New application and protocol classifications
This new release includes more than 400 new classifications. Here are a few of the applications that can now be classified automatically be Uila uObserve. a. Odyssey by Tyler Technologies b. Apache Cassandra c. Citrix Common Gateway Protocol (CGP) d. Open VPN Cloud e. Epicor Enterprise Resource Planning (ERP) f. Juniper Mist .
Please get in touch if you’d like to see a demo or run a complimentary trial of Uila’s solution with these new features.Subscribe
Latest Posts
- How Data Center System Administrators Are Evolving in today's world
- Microsoft NTLM: Tips for Discontinuation
- Understanding the Importance of Deep Packet Inspection in Application Dependency Mapping
- Polyfill.io supply chain attack: Detection & Protection
- Importance of Remote End-User Experience Monitoring
- Application and Infrastructure Challenges for Utility Companies
- Troubleshooting Exchange Server Issues in Data Centers
- Importance of Application Dependency Mapping for IT Asset Inventory Control
- Navigating the Flow: Understanding East-West Network Traffic
- The imperative of full-stack observability