Published on 31 October 2019 by

Seamless integration with

We heard from customers that an integration between Puppet Remediate and would help both InfoSec and IT Ops teams collaborate to reduce the risk in their business by remediating vulnerabilities faster. We are pleased to announce that integration is available today in Puppet Remediate 1.1.0.

Set up is simple — add your connection details to Puppet Remediate and the rest is automatic. No more spreadsheets!

How to connect to Puppet Remediate

Security, control and accountability

RBAC (role-based access control) is extremely important when IT Ops has access to make changes on business critical servers to remediate vulnerabilities. This release enhances RBAC permissions to Puppet Remediate so an administrator can now control who can do what in Puppet Remediate, including:

  • Adding or removing credentials, sources and tasks
  • Running tasks
  • Performing directory administration

Screenshot of how an admin can control RBAC in Puppet Remediate 1.1.0

Puppet Remediate 1.1.0 also introduces LDAP and Active Directory integration, as well as the ability for administrators to create users locally in Puppet Remediate. Now you can leverage existing passwords to log into Puppet Remediate, and administrators can control access centrally in their directory.

Screenshot of enabling LDAP in Puppet Remediate

UX improvements to deliver vulnerability details at each step

Last but not least, the task workflow in Puppet Remediate is now even more intuitive. The context of the vulnerability now comes with you as you build your task. Inaccessible nodes are now more explicitly highlighted right from the first step in your workflow. And Puppet Remediate now offers more explicit feedback as soon as you run a task.

Screenshot of improved task workflow in Puppet Remediate 1.1.0

We hope you enjoy the new capabilities in Puppet Remediate, and would love to hear feedback directly from you on this release and what you’d like to see in future releases. Reach out to me (@Jonathan) on the Puppet Community Slack or email [email protected] and share your ideas.

Jonathan Stewart is a principal product manager at Puppet.

Learn more

Share via:
The content of this field is kept private and will not be shown publicly.

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.