Connections

Instantly access your infrastructure with zero-trust security from your Keeper Vault

What are Keeper Connections?

Keeper Connections allow users to instantly and securely access assets within their target infrastructure, such as servers, databases, web apps and workloads directly from their Keeper Vault. Keeper Connections are configured on PAM Machine, PAM Database, PAM Directory and PAM Remote Browser record types, and once configured, connections are launched directly from these records.

One of the key features of Keeper Connections is the agentless and clientless architecture. Organizations need to install only a Keeper Gateway in each managed environment. This streamlined approach simplifies deployment and enhances security by centralizing access management.

Connection User Interface

Connections are launched directly from the Vault interface with one click. The connection is established between the Keeper Gateway and the target machine, and the session is visually projected into the Vault where you can interact seamlessly.

Connecting to a Windows Machine

Full screen mode and zoom controls are available from the upper right corner of the window.

Connecting to a Linux Machine

Connection Dock

The Connection Dock provides instant switching between active sessions. The dock can be moved to any desired location on the screen.

Connection Dock

The dock can be minimized and moved anywhere on the screen.

Connection Dock Minimized

How do Keeper Connections Work?

When launching a connection, the Web and Desktop Vault Client will render a window with the established connection protocol to the specified target defined on the PAM record. This is done by:

  1. The Vault Client communicating with the Keeper Gateway with the relevant connection info through a secure tunnel

  2. The Keeper Gateway then establishes the connection protocol to the target defined on the PAM Record

  3. After establishing the connection, the Keeper Gateway projects the visual session to the Keeper vault client.

For more information on the architecture, see this page.

Why Use Keeper Connections?

IT Admins, DevOps and development teams struggle with protecting access to cloud and on-prem infrastructure to endpoints like remote desktops, Windows machines, Linux Servers, critical web-based apps, Kubernetes clusters and Databases.

Keeper Connections protects your business, your employees and your customers against data breaches by providing a unified vault for all access and control. Reducing risk and simplifying access are the core tenants of the Keeper platform.

  • Lower complexity: All zero trust access is managed by the Keeper Vault

  • Lower employee risk: No VPNs, No ZTNAs and no Agents

  • Lower supply chain risk: No client-side connection apps

  • Lower attack surface risk: Zero-knowledge encryption and networking

Keeper Connection Features

  • Support for RDP, SSH, VNC, K8s, telnet remote access protocols

  • Support for MySQL, PostgreSQL, SQL Server database protocols

  • Remote browser isolation (http/https) protocol for web-based apps

  • Drag-and-drop file transfer via SFTP to target machines

  • Session Recording and playback

  • Privileged Session Management

  • Role-Based Access Controls

To get started with Keeper Connections, proceed to the next section.

Last updated

Was this helpful?