Remote Access on Docker
Akeyless Remote Access provides secure remote access to resources using just-in-time credentials (dynamic secrets, rotated secrets, and SSH certificates).
Remote Access is enabled through the Akeyless Gateway Docker Compose chart deployment. Usually this is added after the Gateway is deployed, but it can be deployed as part of the Gateway deployment. This document will show how to upgrade your deployment to add Remote Access capabilities.
The Remote Access deployment spins up two Docker containers: akeyless-sra-ssh
and akeyless-sra-web
Prerequisites
-
Docker Installed
-
SSH Certificate Issuer for CLI Access.
-
At least 1 vCPU available with 1GB RAM per Docker container.
Deploying Remote Access
The docker-compose.yaml
and .env
files used to deploy the Gateway hold the Remote Access default values as well.
Configuration
Secure Remote Access will be set with the same GATEWAY_ACCESS_ID
and GATEWAY_ACCESS_ID
you used for your deployment with the Gateway.
To provide just-in-time native CLI access for your users using SSH Certificates, you will mount your ca.pub
file to /var/akeyless/creds/
inside of the akeyless-ssh
component. To do this, provide a local directory which contains your ca.pub
file which you created as part of your SSH Certificate Issuer creation.
Creating a public key
If you don't have an SSH certificate ready, please follow this guide on creating SSH Cert issuer with Akeyless and set your
ca.pub
.
Install
Make sure your docker-compose.yaml
and .env
files are in the same directory and you run the below command from that directory.
docker compose up -d
Check that both akeyless-sra-ssh and akeyless-sra-web containers are up by running docker ps
.
Upgrade Remote Access
To upgrade Remote Access to the latest version, run the same command:
docker compose up -d
Recommended Security Configuration Options
Allowed Redirect Gateways
The Allowed Redirect Gateways option ensures that only specific redirects (usually Remote Access are accepted. This configuration, allows administrators to define a list of authorized URLs that will be considered valid for redirection from the Web Portal back to the remote access server. This setup enhances security by ensuring that users are only redirected to trusted URLs.
Run the following command from the Terminal:
akeyless gateway update remote-access --allowed-urls <redirect-urls>
This can also be done via the console by going to Gateways -> Your-Gateway -> Manage Gateway -> Remote Access.
Updated about 4 hours ago