The Linux GUI Client User Interface
About Admin By Request
The user interface is graphical and is accessed via the icon menu in the menu bar (top right) of the screen:
Click the icon to display the menu and select About Admin By Request for further information:
In this topic
Requesting Administrator Access
Setting-up a Break Glass Account
About Admin By Request
Once installed, Admin By Request is running in the background for as long as the endpoint is powered-on. Selecting the app from the menu bar launches the user interface, which comprises a simple window with two buttons down the left-hand side:
The default panel is About Admin By Request, which is accessed via the top button. It shows the current workstation edition, license details, website link, and copyright information.
Click the About button to get back to this panel if viewing one of the other panels.
There are two buttons in the Linux client: About and Connectivity, each displaying a panel. The About panel includes a link that opens further panels for each of the Linux client Components.

-
Components
Clicking link Components on the About panel displays information about the individual modules that make up Admin By Request.
The modularized architecture means components can be updated as required via Linux distribution package management with minimal impact on other parts of the system.
The following screens show current component versions. Refer to these should the need arise during troubleshooting.
-
Admin By Request for Linux:
-
-
Connectivity – displays the current operational status of the Admin By Request system, including Internet and Cloud connectivity, and details about the current workstation and user (see Connecting via a Proxy Server for panel).
Connecting via a Proxy Server
Endpoints can be configured to route privilege requests through a proxy server, which works transparently with Admin By Request.
If the user does have a proxy server enabled, its configuration is passed to the underlying service that will in turn use this proxy for cloud service communications. The proxy traffic uses NO-AUTH (no credentials) and will be seen as the computer account generating the traffic.
The Connectivity panel shows a proxy server and AD information only if they are used for the connection. This is different from previous versions of the client, where, if none were found, proxy server and AD connector were indicated with "None" and "Not applicable" respectively.
Ports and IP addresses
Admin By Request uses port 443 and the IP addresses and URLs that need access through firewalls are as follows.
If your data is located in Europe:
-
IP: 104.45.17.196
-
DNS: linuxapi1.adminbyrequest.com
If your data is located in the USA:
-
IP: 137.117.73.20
-
DNS: linuxapi2.adminbyrequest.com
If you wish to remotely access endpoints using Unattended Access and Remote Support (refer to Unattended Access Prerequisites and Remote Support Prerequisites for more information):
-
Outbound MQTT broker connectivity via Websockets- port 443 for the following:
-
FastTrackHubEU1.azure-devices.net (if your data is located in Europe)
-
FastTrackHubUS1.azure-devices.net (if your data is located in the USA)
-
-
For Unattended Access, RDP needs to be enabled on port 3389 on the device
When the endpoint starts up, Admin By Request checks to see if it can connect directly to its host cloud server. If it can, then no proxy server is required and no proxy server details are shown in the Connectivity panel.
If it cannot connect directly, it checks the following configuration file and works through the listed servers one by one until a connection is possible:
/etc/abr/configurations.d/proxy.conf.template
The default entries in this file are listed below. If you need to configure a proxy server, replace the information in this file with your proxy server information.
{
"proxy":
[
{
"type": "HTTPS",
"hostname": "my-proxy-01.anyone.com",
"port": 8080
},
{
"type": "HTTPS",
"hostname": "my-proxy-02.anyone.com",
"port": 8080
}
],
}
If the endpoint connects via a server configured in this file, None is replaced by the hostname of the proxy server and all privilege requests are routed through it.
Refer to How We Handle Your Data for more information.
Using Run As Admin
Run As Admin (also known as App Elevation) allows for the elevation of a single application.
This capability negates the need for users to initiate an Admin Session. Elevating privileges for execution of a single file is the much safer option compared to elevating the user’s privileges across the endpoint.
In Linux, a single line sudo command implements Run As Admin:
-
Run a sudo command.
-
If approval is required, a pop-up will appear asking for information, including reason. If approval is not required, a reason must still be given for logging purposes.
-
When the sudo command is complete, check the portal under Auditlog > RUN AS ADMIN rather than Auditlog > ADMIN SESSIONS. The sudo command is logged under RUN AS ADMIN.
Pre-approved applications run without prompting for a reason and the activity is logged under RUN AS ADMIN. (e.g. the sleep
command).
The elevated privileges last only for the duration of the install and apply only to the particular application or package authorized.
Check the audit log in the portal for details on the user, the endpoint, the application run and execution history.
MFA with Run As Admin
MFA is available as an option for authenticating users prior to granting Run As Admin privileges. The options in the portal for authenticating users are:
-
Confirm - User must confirm with Yes or No to elevate via Run As Admin.
-
Multi-factor Authentication - User must validate identity using MFA through SSO.
Refer to Linux Settings (Authentication tab) for more information.
Requesting Administrator Access
Requesting administrator access is also known as requesting an Admin Session, which is a time-bound period during which a standard user has elevated privileges and can carry out administrator-level tasks..
As with About Admin By Request,
Timing can be important when an admin session is started for some GUI operations:
-
If you start an admin session after you have started the GUI interface (for example, add a new user account in Settings), you might need to refresh the current GUI screen by selecting another option in Settings, then going back to User Accounts.
-
If you start the admin session before opening Settings, there is no need to refresh the user interface.
A standard user making this selection where approval is required initiates the following sequence of events.
-
The user enters email, phone and reason information into the form and clicks OK.
NOTESettings in the portal control the full extent of what is displayed to the user:
-
If Code of Conduct is enabled, the user must acknowledge a Code of Conduct pop-up to continue (EPM > Settings > Linux Settings > Endpoint > INSTRUCTIONS).
-
If Require approval is OFF, the approval steps are skipped (EPM > Settings > Linux Settings > Authorization > AUTHORIZATION > Admin Session).
-
-
The IT administration team is notified via the Admin By Request portal that a new request for administrator access has arrived.
-
The duration of an admin session is set via the portal (15 minutes in this example) and the countdown timer ticks down to zero, at which time the session ends. The user can optionally end the session at any time once it has started by clicking Finish.
See Changing Admin Session Duration for more information on changing the duration of the countdown timer.
During an Admin Session, users can install programs requiring admin rights, install drivers and change system settings other than user administration. All activity during the elevated session is audited, so you can see in the audit log the reason why the person needs the elevation; anything installed, uninstalled, or executed.
During an Admin Session, users cannot uninstall Admin By Request, or add, remove or modify user accounts.
MFA with Admin Sessions
MFA is available as an option for authenticating users prior to allowing an Admin Session. The options in the portal for authenticating users are:
-
Confirm - User must confirm with Yes or No to start an Admin Session.
-
Multi-factor Authentication - User must validate identity using MFA through SSO.
Refer to Linux Settings (Authentication tab) for more information.
Setting-up a Break Glass Account
Portal: Inventory > [Computer] > Break Glass
The Break Glass feature provides additional security for Linux endpoints. It creates a new, temporary, one-time-use administrator account on an endpoint that works on domains, Entra ID, and stand-alone, which audits all elevated activity, and terminates within a pre-defined amount of time or on log out.
Security benefits
The Break Glass feature includes the following security benefits:
-
Break Glass circumvents the need to use the built-in local Administrator account – you can disable it completely to add an extra later of security to your endpoints.
-
The account must be used within an hour of being generated, minimizing the potential attack window and risk of account compromise.
-
Risk is further minimized by a one-time-only log in functionality: the user can log in once, and after log out, the account is terminated.
-
The user has only the time specified under Expiry when the Break Glass account was generated to use the administrator account; this duration is indicated on the built-in desktop background of each account. When the time-period is up, the session is terminated.
-
Measures are in place to ensure the Expiry time cannot be tampered with: if the Account user attempts to extend their time limit by adjusting the clock, the Account automatically logs out / terminates.
-
All Usernames and Passwords are automatically generated, random, and complex, minimizing the possibility for a successful brute force attack.
-
Passwords are stored within the web application, only accessible by Portal users / IT Admins via credentials – a safer option compared to MS LAPS' storage of admin account passwords in plain text along with the AD computer record.
When would I use a Break Glass account?
A Break Glass account is useful in the following scenarios:
-
Regaining Domain-Trust Relationship
As the name suggests, the Break Glass feature is ideal for "last resort" situations, such as when the domain-trust relationship is broken and needs to be reconnected using an Administrator account. -
Provisioning a Just-In-Time Administrator Account
The Break Glass Account doubles up as a Just-In-Time account that can be used for specific purposes / situations when necessary; e.g., provisioning an account for someone who doesn’t have credentials, but requires access to service an endpoint.
Using the Break Glass feature
Setting-up and using a Break Glass account comprises three tasks:
-
Generate
Create a Break Glass account:
-
Log in to the Portal and navigate to the Inventory page. Select an endpoint on which you want to enable the Break Glass account and select Break Glass from the left-hand menu.
-
From the Expiry drop-down menu, select an amount of time for which you want the Account to be available. The default is 2 hours, but the period can range from a minimum of 15 minutes, to an unlimited amount of time.
-
Once generated, the status of the Break Glass account is updated in real-time in the Portal. The four possible states are:
-
Waiting for Endpoint – The account is generated in the User Portal but not yet created on the endpoint (to create the account on the endpoint, see the next section Activate).
-
Ready to Log On – The account is created but has not yet been activated / used (i.e., logged in to).
-
Session in Progress – The account is currently in use.
-
Account Removed – The account has been terminated either due to the user logging out, or the pre-defined Expiry time being reached.
-
-
Optionally, you can send the new Break Glass account credentials via SMS (i.e., text message) by entering the intended recipient’s mobile number into the text box and clicking Send SMS.
-
-
Activate
Activate the Break Glass account using one of the following methods:
-
Restart the device, then wait approximately 30 seconds for the account to be created. The Portal will update the status message when the account is ready, and the account will appear in the bottom-left of the Windows log on screen along with the other accounts available on the endpoint:
-
If enabled, you can select Other User in the Windows log in screen and enter the generated Break Glass account User and Password into the fields. Remember to prefix the User credential with the device name (e.g. DESKTOP-LMSEFL8\ABR524154).
NOTEThis may fail on the first attempt; if so, wait 10 seconds and then try again.
-
A third method to activate the account is by logging in to another account on the endpoint, selecting the Admin By Request icon from the bottom toolbar, and clicking the About item from the menu.
-
-
Terminate
Use the account and log out:
-
Once logged in to the Break Glass account, the user has administrator privileges to do what they need to do, within the Expiry time displayed on the built-in screensaver:
-
Terminate the account by either logging-out, or allowing the account to log out automatically when the Expiry time is reached – whichever comes sooner.
-