Tunnels
Create a secure and encrypted TCP/IP connection to your target endpoint from your Vault
Last updated
Was this helpful?
Create a secure and encrypted TCP/IP connection to your target endpoint from your Vault
Last updated
Was this helpful?
Keeper Tunnel is a secure, encrypted TCP/IP connection established between your vault client to the target endpoint through the Keeper Gateway. Keeper Tunnels can be configured on PAM Machine, PAM Database, and PAM Directory Record Types. Once a tunnel is activated from the Keeper Desktop application, users can make use of any native app to communicate with the target infrastructure.
Note: Keeper Tunnels are only available using the native Keeper Desktop App. Download the Keeper Desktop Preview to use Tunnels
When starting a tunnel, a local port is opened up on the local device running Keeper Desktop client. Native applications will communicate to the target from this local port. This is done by:
The Desktop Vault Client communicating with the Keeper Gateway with the relevant connection info through a secure tunnel
The Keeper Gateway then establishes a secure, encrypted TCP/IP connection to the target IP/Port found on the PAM Record
Opening a local port on the local device running Keeper Desktop Client
Native applications will connect to this local port to communicate with the target IP/Port
For more details on the security model, see the Connection and Tunnel Security page.
A common challenge faced by IT Admins, DevOps and development teams is providing remote employees or contractors with access to internal company resources without exposing those resources to external networks. Additionally, remote employees may want to use their desired native applications to access these resources.
Keeper Tunnels solves the above solutions by:
Providing secure, encrypted connection from client to target resource
Allowing users to securely connect to target resource with the native application of choice
Simplifying Configuration - streamline setup and management of secure connection from PAM Record types
Access controls and compliance - centralized management of access controls, ensuring that all connections meet organizational security policies and compliance requirements
To get started with Keeper Tunnels, proceed to the next section.