Latest Posts

Thycotic Secret Server - SSH Proxy & RDP Proxy

All SSH sessions in any Secret Server edition can be set up to proxy through Secret Server for greater control and logging capabilities. Set up firewall rules to ensure that privileged account access only comes from the Secret Server machine.




Traffic FlowChart

1  Normal SSH Launcher Traffic 








2  SSH Proxy Traffic











3  RDP Proxy






SSH Proxy


Steps:
1  Enable SSH Proxy




2  Enable Proxy in Secret Policy




3  Apply Secret Policy and Test


SSH Tunneling

SSH tunneling is a method of transporting arbitrary networking data over an encrypted SSH connection. It can be used to add encryption to legacy applications. It also provides a way to secure the data traffic of any given application using port forwarding, basically tunneling any TCP/IP port over SSH

Enable SSH Tunneling for other traffic such as RDP.





RDP Proxy

There are two methods to use RDP Proxy:



1  RDP Proxying using RDP Proxy


How It Works
  1. The user clicks the RDP launcher in SS.
  2. The launcher executes on the client's machine.
  3. The launcher establishes a connection to the RDP Proxy using credentials generated for the session. These credentials are short lived and can only be used once.
  4. Once the launcher has successfully authenticated with the RDP proxy, the RDP proxy looks up the credentials and target hostname to connect to.

    • Note: The secret credentials do not get served to the client machine in this flow, which improves credential security.
  5. The RDP proxy connects to the desired remote host with the secret credentials.
  6. The RDP session is established.
  7. RDP traffic is sent back and forth over the RDP proxy, session keystrokes are monitored if session recording is enabled.




2  RDP Proxying using SSH Proxy and SSH Tunneling
The RDP Proxying feature allows RDP connections, established using the launcher, to be routed through Secret Server. It does this using a SSH tunnel, created using SSH local client port forwarding, from the client's machine to the Secret Server SSH Proxy.


How it works
  1. The user clicks the RDP launcher in Secret Server.
  2. The launcher executes on the client's machine.
  3. The launcher establishes a connection to the SSH Proxy using unique credentials generated for the session. These credentials are short lived and can only be used once.
  4. Once the launcher has successfully authenticated with the SSH Proxy, the launcher will open a socket and listen for a connection on an available ephemeral port (the forwarding port) on the client's machine.
  5. RDP launches on the client machine and connects locally to the forwarding port.
  6. All RDP traffic for this session is now routed through the SSH tunnel to Secret Server, then forwarded to the target machine.
  7. The RDP session is established.



References

















No comments