Main concepts
This topic introduces the key Remote Access concepts and personas.
Key concepts
Remote Access uses these key concepts to provide secure access to company resources.
-
Ensures that remote vendors are confirming identities each time they need access to critical assets
-
No VPNs, agents or passwords needed
-
Utilizes the capabilities of smartphones to confirm identity through inherent authorization methods and dynamic QR codes
-
Simplifies provisioning process for external vendor access to CyberArk
-
Support for direct or delegated provisioning
-
Integrates with Privileged Access Manager - Self-Hosted and CyberArk Identity web apps to audit, monitor, and remediate third party access.
Personas
Remote Access uses the following personas to manage and benefit from secure access to an organization's applications.
The user who manages the remote access policies of Remote Access for provisioning access to PAM - Self-Hosted for third-party vendors or privileged employees.
An internal employee who can access company resources remotely through Remote Access.
A non-employee who can be provided remote access to company resources through Remote Access.
Interfaces
The Remote Access platform on your browser through which users can access applications, and where administrators can configure sites, tenants, vendors, and more.
The CyberArk Mobile app that authenticates you to Remote Access using biometric data.
Data retrieval
Customers can view their data at any time on the Activities page, in the Remote Access portal. REST APIs can also be used to extract data from the Remote Access service.