Skip to content

Commit 9ca968e

Browse files
Update README.md
1 parent ebaff21 commit 9ca968e

File tree

1 file changed

+5
-10
lines changed

1 file changed

+5
-10
lines changed

README.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,4 @@
1-
![](https://github.com/lithnet/access-manager/
2-
3-
4-
5-
/images/access-manager-logo.png)
1+
![](https://github.com/lithnet/access-manager/images/access-manager-logo.png)
62
# Lithnet Access Manager
73
Lithnet Access Manager is a tool that allows you to safely delegate sensitive administrative access to computers in your Active Directory environment in a modern and user-friendly way.
84

@@ -25,8 +21,7 @@ We recommend you have a look at our other product [Lithnet Password Protection f
2521
### Web-based access to local admin passwords
2622
Access Manager provides a simple web-based and mobile-friendly interface for accessing local admin passwords. There's no need for admins to install custom software, or have access to AD administrative tools to access LAPS passwords.
2723

28-
<img src="https://github.com/lithnet/access-manager/wiki/images/web-request-laps.gif" Width="400"/>
29-
24+
<img src="https://images.squarespace-cdn.com/content/v1/61ae2a2d4b4792139fe57231/edb5e590-c52d-4d4f-b5ec-06afd0e48691/web-request-laps.gif?format=400w">
3025
Administrators also have the option of forcing an expiry time when a password is accessed. This ensures that the password is rotated after use.
3126

3227
We use LAPS passwords ourselves, so we know they can be painful at times. We try to take away as much of that pain as possible. From using fonts where you can actually see the difference between an lower-case L and a capital I, to showing a breakdown of the password using the NATO phonetic alphabet to make it easy to read it out to someone. Ever find yourself needing to type a LAPS password into a Windows logon screen? Have access manager read the password to you while you type!
@@ -36,17 +31,17 @@ Whether you use Microsoft LAPS, or the Lithnet Access Manager agent, the user ex
3631
### Access historical local admin passwords
3732
Deploying the Lithnet Access Manager Agent to your fleet allows you to upgrade to encrypted local admin passwords and gain the benefit of having previous local admin passwords stored in the directory as well. This means no more issues getting locked out of computers when they are restored from backup or reverted from a snapshot.
3833

39-
<img src="https://github.com/lithnet/access-manager/wiki/images/web-request-laps-history.gif" Width="400"/>
34+
<img src="https://images.squarespace-cdn.com/content/v1/61ae2a2d4b4792139fe57231/e2cc6884-aa2a-4b88-9c92-eb714cd6a9ae/web-request-laps-history.gif?format=400w"/>
4035

4136
### Just-in-time administrative access to computers
4237
Using the same web interface, users can request that their account be added to a group that is a member of the local administrators group of the computer. This access is temporary and automatically removed after the allowed time period. Access Manager makes use of the Active Directory time-based membership feature in Windows Server 2016 and later domain functional levels, or time-based (dynamic) objects in earlier versions of AD.
4338

44-
<img src="https://github.com/lithnet/access-manager/wiki/images/web-request-jit.gif" Width="400"/>
39+
<img src="https://images.squarespace-cdn.com/content/v1/61ae2a2d4b4792139fe57231/1fdc69a4-1b3c-4f52-a0be-14393d735b46/web-request-jit.gif?format=400w">
4540

4641
### Easy access to BitLocker recovery passwords
4742
Authorized users can also request access to the BitLocker recovery passwords for a computer through the same easy-to-use web interface.
4843

49-
<img src="https://github.com/lithnet/access-manager/wiki/images/web-request-bitlocker.gif" Width="400"/>
44+
<img src="https://images.squarespace-cdn.com/content/v1/61ae2a2d4b4792139fe57231/89e2e421-e033-49a4-818b-60a80ff8cb84/web-request-bitlocker.gif?format=400w">
5045

5146
### Audit success and failure event logs
5247
All success and failure events are logged to the Windows event log and a file. Optionally, you can send audit events via email, webhooks, and even PowerShell.

0 commit comments

Comments
 (0)