PAM360 Remote Connect4 minutes to read
PAM360 Remote Connect is an independent desktop client for Windows, designed to help you launch direct remote connections via password-less login to Windows and SSH-based target resources without needing to install multiple remote clients or a web browser. To achieve this, Remote Connect utilizes the PAM360 server's API to act as a standalone client for remote connections that is independent of the PAM360 web application. Similar to PAM360's web application, PAM360 Remote Connect ensures seamless operation of the authentication and remote access mechanisms for RDP and SSH-based connections. Essentially, PAM360 Remote Connect acts as both the Microsoft Terminal Services Client (MSTSC) and SSH PuTTY client rolled into a single, lightweight application with auditing capabilities. To learn how to configure the PAM360 Remote Connect application in a user endpoint and attain remote sessions from it, refer to this help documentation. As long as the source machine and the target endpoints can achieve connectivity through the required RDP/SSH protocols, PAM360 Remote Connect can be installed in the individual workstations of users and used to launch remote connections to the endpoints by leveraging PAM360's access control functions. However, with a configured SSH proxy, the source machine connectivity with the PAM360 server is sufficient to attain the remote connection. To learn about configuring the SSH Proxy for remote sessions in the PAM360 Remote Connect application, refer to the sections described below. SSH Proxy for Remote ConnectionsTo avoid direct communication between the PAM360 Remote Connect application and the target endpoints during remote sessions for enhanced security, configure the SSH proxy available in PAM360 for the PAM360 Remote Connect application. 1. Roles Required to Perform this Operation
2. PrerequisitesBelow are the prerequisites for the SSH proxy to work seamlessly to attain a secured remote connection:
3. Configuring SSH Proxy for PAM360 Remote Connect
| |
[Webinar] Weave privileged access security into your org-wide ITSM workflows. Register now