Privileged RDP Sessions

Creating secure PAM RDP sessions with or without the use of Native Client Side Applications.

For far too long, IT departments gave the actual secrets (logins, passwords and native permissions) to administrators, developers or outside contractors that needed access to their business’s privileged systems and endpoints.

These secrets were often shared via emails, Excel files, SharePoint lists or countless other methods which clearly opened a glaring hole in any corporate security policy.

Not to mention, how could these secrets ever been changed or updated without negatively impacting these users’ workflows.

The downsides and security risks are obvious, but what other option is there?

Privileged Access Management

Meet Privileged Access Management.

With Access Manager you can easily allow administrators, developers and contractors to create secure, privileged and recorded sessions to remote Windows endpoints using the RDP protocol without providing them the secured passwords.

And most importantly, this can be accomplished directly in their desktop or mobile browser (with no additional requirements) or using their existing native desktop or mobile RDP clients like MSTSC, Remote Desktop Connection Manager or mRemoteNG without custom launchers or agents.

PAM-RDP-Connection-Clients

Access Manager secures your sensitive connection secrets in its Identity Vault, you share access to these secrets (but not the actual secrets themselves) with selected users and they simply Connect to the endpoint.

You decide who, where and when the access is granted and Access Manager will connect, audit and record their activity and even rotate the passwords as needed.

It doesn’t get much easier or more secure than that!

 

Access Manager provides secure, privileged RDP access to your server and endpoints with the following methods:

  • Directly in your web browser without the need of client side agents, custom launchers or applications;
  • Natively using your own RDP client applications like MSTSC or mRemote;
  • Remote App technology that provide a Jump Server like native application experience.

FAQ-RDP-Proxy-Mobile-Device-Small-Example

Secure Access Manager RDP sessions directly from your existing mobile or desktop application.

Use Privileged Access Management

Use PAM instead of others Password Vaults or Session Brokers.

Others typically require heavy server installs and agents (or modified client launchers) in order to create such remote sessions, while others have limited support for remote protocols or don’t offer password resets or rotation.

Access Manager creates a streamlined approach to:

  • Establishing secure, “password-less” access to remote endpoints without agents;
  • Providing access to multiple endpoints with only the user’s personal login account;
  • Eliminating the use of shared accounts;
  • Allowing the continued use of common desktop RDP clients like MSTSC or mRemote;
  • Auditing user activity during their connected sessions with reporting and notification options;
  • Recording keystrokes and file transfer operations;
  • Enforcing limited or time restricted user access via configured access request workflows;
  • Randomizing passwords as needed based on time or event based policies;
  • Providing users with access to privileged systems without disclosing the secrets to them;
  • Maintaining all endpoint details, secrets and information in a secure, 256-bit encrypted Vault.

Privileged Access Management accomplishing

Access Manager brokers the RDP connections through its Session Manager module in order to secure the login credentials, enforce the permissions and workflow requirements and overlay the auditing, recording and reporting functionality with the session.

To better explain how it works, let’s create a simple example scenario.

 

Bob, your outside contractor, needs to login to your Windows web server to resolve an issue.

You don’t feel comfortable providing Bob with the Admin login credentials that he needs and you don’t really have the time to “watch” over him, so you give him access to PAM and let it secure and audit Bob’s activities.

Now all Bob has to do is securely login into PAM (optionally with MFA/2FA or SSO) and find this shared web server record.

He opens the record and simply clicks the Connect button to open a remote session directly in his browser, no agents or clients required.

Access Manager establishes the connection using the details in the record, which Bob cannot see nor copy, and then hands control over to him.

Bob works on the server to resolve the issue and when down he simply logs out all while Access Manager is monitoring and recording his activities in the background.

PAM-SSH-Connection-Browser

Alternatively, if Bob prefers to use his native RDP client he simply creates a session to Privileged Access Management, specifying the web server’s record ID and his Access Manager login credentials, and Access Manager will broker the connection and create the remote session to the server directly from within his RDP client’s session (desktop or mobile).

So Bob can jump between his RDP session, use his familiar shortcuts and formatting, work on your web server all without him knowing the actual server secrets.

FAQ-RDP-Proxy-Client-Password

 

PAM-SSH-Connection-PuTTY-Active

Try it

Please review the following articles to further understand how to configure secure, remote RDP sessions in Privileged Access Management.