PAM › User Guide
Overview
Overview of how to securely connect to servers and applications through the GAccess Platform
Connecting to Remote Targets
GAccess provides access to remote servers and applications without requiring you to know or store credentials. All authentication is handled transparently by the gateway, using credentials managed in the vault.
How to Connect
Using the web interface, you can navigate through the left-side menu depending on the type of target you want to access:
- Infrastructure: Select this option to access infrastructure devices such as servers, routers, firewalls, and databases.
- Applications: Select this option to access web applications.
After navigating to the desired page, you will see a list of all assets you have been granted access to. If you have the appropriate permissions, a Connect button will be displayed.
When clicking this button, you can select the connection method and the credential you want to use, based on your permissions.
When you initiate a connection, GAccess retrieves the stored credentials for the target, establishes the session on your behalf, and streams it to you. You interact with the remote system normally — typing, clicking, and transferring files — while GAccess handles the security layer in the background.
Connection Methods
There are three ways to connect to a target, depending on how your administrator has configured access and which tools you prefer.
Web Connection
Connect directly from your browser — no software installation or configuration required. GAccess renders the remote session inside the browser using a secure, real-time protocol.
Supported session types:
| Session type | Description |
|---|---|
| RDP | Full Windows desktop session rendered in the browser |
| SSH | Linux/Unix terminal session rendered in the browser |
Native SSH Client
Connect to Linux targets using any standard SSH client (Terminal, PuTTY, etc.) pointed at the GAccess Gateway. Your credentials are injected automatically — you never need to know the target password or key.
How to connect:
Use the following username format when your SSH client prompts for a username:
your_gaccess_username@your_domain@target_username@target_hostnameExample:
ssh john@acme.com@root@10.0.1.50 -p 2222 -h gateway.yourcompany.comWhen prompted for a password, enter your GAccess account password (not the target's). GAccess authenticates you, retrieves the target credential from the vault, and connects you transparently.
The gateway SSH proxy listens on port 2222 by default. Check with your administrator if you are unsure of the address or port.
Native RDP Client
Connect to Windows targets using any standard RDP client (Remote Desktop Connection, Microsoft Remote Desktop, etc.) pointed at the GAccess Gateway. As with SSH, credentials are injected automatically.
How to connect:
Point your RDP client to the gateway address on port 3389. When prompted for credentials, enter your GAccess account details. GAccess handles authenticating to the Windows target on your behalf.
Reach out to your administrator for the exact gateway address and any VPN or network requirements.
MFA and Federated Authentication with Native Clients
When using native SSH or RDP clients, the way you authenticate depends on your account type and whether MFA is enabled.
Local Users with MFA
If your account has MFA enabled, append a pipe character (|) followed by your one-time password (OTP) to your GAccess password when prompted:
password|OTPExample: if your password is MyPassword and your authenticator app shows 482931, enter:
MyPassword|482931Entra ID Federated Users
Federated users authenticate through Entra ID and cannot provide their credentials directly to the native client. Instead, GAccess generates a short-lived temporary credential token that you can use in place of your password.
To obtain your token:
- Open the GAccess web interface and navigate to the target you want to connect to.
- Click Connect and select your native client connection method.
- The connection dialog will display a temporary credential token.
- Use that token as your password when your SSH or RDP client prompts for one.
Session policies
Depending on how your administrator has configured the target, certain capabilities may be restricted during your session:
- Copy / Paste — clipboard access between your machine and the remote may be limited or disabled in one or both directions.
- File transfer — uploading or downloading files may not be available.
- Session duration — sessions may have a time limit, after which you will be disconnected automatically.
- Recording — sessions may be recorded for audit and compliance purposes. You will be notified at the start of the session if recording is active.