This topic introduces the key Remote Access concepts and personas.
Remote Access uses these key concepts to provide secure access to company resources.
Ensures that remote vendors are confirming identities each time they need access to critical assets
No VPNs, agents or passwords needed
Utilizes the capabilities of smartphones to confirm identity through inherent authorization methods and dynamic QR codes
Simplifies provisioning process for external vendor access to CyberArk
Support for direct or delegated provisioning
Integrates with Privileged Access Manager - Self-Hosted and CyberArk Identity web apps to audit, monitor, and remediate third party access.
Remote Access uses the following personas to manage and benefit from secure access to an organization's applications.
The user who manages the remote access policies of Remote Access for provisioning access to PAM - Self-Hosted for third-party vendors or privileged employees.
An internal employee who can access company resources remotely through Remote Access.
A non-employee who can be provided remote access to company resources through Remote Access.
The Remote Access platform on your browser through which users can access applications, and where administrators can configure sites, tenants, vendors, and more.
The CyberArk Mobile app that authenticates you to Remote Access using biometric data.
Customers can view their data at any time on the Activities page, in the Remote Access portal. REST APIs can also be used to extract data from the Remote Access service.