Getting Started with Remote Access

How do I get started – General

The very first thing is to make sure Remote Access is turned on:

  1. In order to enable remote access, simply log into the Admin By Request portal and head over to Settings > Server Settings > Remote Access Settings.

  2. From the AUTHORIZATION tab, ensure that Allow remote control is turned On:

How do I get started – Managed Service?

A managed service is a way of operating Remote Access so that your infrastructure allows an outbound connection to establish a secure tunnel from your respective endpoints and that these have the Admin By Request Server agent installed.

Using Admin By Request's Managed Service for remote access is the default. If you decide on this option when first enabling Remote Access, no configuration is required; all you need to do is:

  1. Ensure your endpoints have the Admin By Request Server agent installed.

  2. Connect to an endpoint (see below).

If this is not the first time enabling Remote Access and you have previously configured an on-premise gateway, the following tasks are needed to setup a managed service using a Cloudflare tunnel:

How do I get started – Self-hosted Implementation?

A self-hosted implementation means that you run Remote Access on-premise inside your own infrastructure, including the ability to run Docker containers. To establish a secure tunnel, your infrastructure must also allow outbound connections to Cloudflare.

IMPORTANT:

With the release of the 2.0.9 version of Remote Access, we have introduced a new environment variable that needs to be present in order for the gateway to function properly.

The new variable is called AUTH__TOKEN and, If you're upgrading your on-premise gateway from 2.0.1 to the latest version, you will need to add this environment variable to your Docker setup.

Please refer to Upgrading Remote Access On-Premise (Self-hosted) for more information.

The following tasks are needed to setup a self-hosted implementation:

Upgrading Remote Access On-Premise (Self-hosted)

A new environment variable has been introduced from version 2.0.9 that needs to be present in order for your gateway to function properly. The new variable is called AUTH__TOKEN and you can add this environment variable to your Docker setup to enable the next docker compose pull to complete successfully.

AUTH__TOKEN needs to be set for all three images: Connector, Proxy and Discovery. The value of the AUTH__TOKEN variable can be anything you choose - it just needs to be the same across the different services. We recommend setting it to a UUID value or something of similar complexity.

In the case of a Docker compose file, the change would look like this:

Once these changes have been made, you can run the following commands (in order):

Copy
sudo docker compose pull
sudo docker compose up -d

This will spin up the containers using the new image and the newly added AUTH__TOKEN variable.

NOTE:

If you spin up a new gateway using the portal, you will not need to change anything manually. The required changes will be incorporated into the docker compose file generated by the portal.

Discovery

When using the self-hosted on-premise setup, the Discovery module is also available. The Discovery module automatically looks at the current network in which it is running and reports findings back to the portal about endpoints responding on ports 3389, 22 or 5900/5901.

This gives you the advantage of not having to manually map endpoints that are not running the Admin By Request Server agent. This also has the benefit of mapping your network(s) automatically to your Admin By Request inventory, allowing you to connect to agent-less devices like routers, firewalls etc.

Refer to Configuring Discovery for more information on Discovery.