Navigate the remote work landscape with confidence: leverage familiar approval flows and features to enable secure, browser-based connections to workstations, servers, and network devices, and provide remote support for end users.
Let us show you.
Three Core Remote Access & Management Features
Unattended Access
Allows for access to servers, devices, and workstations via standard protocols and can be configured as a cloud service or as an on-premises solution (including agent-less devices).
Remote Support
Offers the ability to initiate screen sharing and control directly between the devices of an IT admin and an end user.
Vendor Access
Allows for external users, such as third-party vendors, to be given secure access to internal devices via an external portal.
Leadership Insights
CEO & Director discuss the product, vision, impact, and more.
Secure Remote Access
1:52
2:01
1:38
2:04
2:02
0:59
Enhanced Security Controls
Integrated into the Admin By Request Ecosystem
Comprehensive Audit Logging & Session Recording
No Proprietary Software Required
Includes Core Workstation Features:
Auditlog
Track all privileged activity on servers
Inventory
Gather all details about devices in your network
Sub-Settings
Create granular access controls
Auto-Approval
Allow auto-approval of requests for elevation
Endpoint MFA/SSO
Enforce business rules with MFA and SSO
Integrations
Teams, Slack, Splunk, Sentinel, Intune, and more
Feature Highlight
Unattended Access

The Need:
Complex IT environments require secure user access to servers and network endpoints.
Current solutions such as VPNs or jump servers pose efficiency and security challenges.
Exposing protocols like RDP and SSH to the internet for remote access is not secure.
Tracking user activity during remote sessions is difficult with existing methods.
Setting up and using current products on the market is often cumbersome and requires re-learning.
The Solution

Cloudflare Tunnelling: How It Works
- Connector – Manages data validation, translation between the portal and proxy container, log management, health checks, and other critical functions.
- Proxy – Establishes a protocol connection between Admin By Request and your endpoint, supporting RDP, SSH, or VNC protocols.
- Discovery – Automates the discovery of connectable devices within the same network as the gateway.

The future of remote work
Revolutionized Connectivity
An innovative browser-based solution simplifies device access.
Streamlined IT Management
Integrated PAM features ensure centralized, efficient management.
Flexibility at Its Core
Customizable for both managed cloud and self-hosted solutions.
Key Benefits
Seamless and Tailored Integration
Fits seamlessly into existing infrastructures without disruptions.
Innovative Technology
Leverage Cloudflare tunnels for cutting-edge, secure remote connectivity.
Prerequisites Made Easy
Simple solutions for self-hosted or cloud service configurations.
Simplified Experience
Connect effortlessly through a user-friendly remote access environment.

Admin By Request Secure Remote
Your key to unlocking secure, flexible, and productive remote access, management, and support.
FAQs
What is Secure Remote Access and how does it work without VPNs?
Secure Remote Access is a Zero Trust, browser-based remote access solution that provides just-in-time connections to internal systems without requiring persistent VPN tunnels. Instead of always-on connections, our solution uses secure WebSocket sessions through Cloudflare tunnels or self-hosted gateways. When access is needed, users request permission through the portal, and once approved, they connect directly through their web browser. Sessions are automatically terminated when complete, eliminating standing access points that attackers could exploit.
What are the three components of Admin By Request's Secure Remote Access solution?
Our Secure Remote Access solution includes three distinct components:
- Unattended Access provides protocol-level remote access (RDP, SSH, VNC) to endpoints without requiring a user to be present at the target device.
- Vendor Access allows external third parties to securely access internal systems through their web browsers via access.work, with scope-limited permissions.
- Remote Support enables live screen-sharing and control sessions between IT administrators and end users for helpdesk scenarios.
All three components work through the same centralized management portal.
How does Secure Remote Access handle vendor and contractor access securely?
External vendors and contractors access systems through our Vendor Access component via access.work, requiring no software installation on their devices. They authenticate securely and can only access systems within their approved scope. Every vendor interaction is fully logged and auditable, eliminating the need to create internal accounts for vendors or expose systems through traditional VPN access.
Can Secure Remote Access work for both cloud-hosted and on-premises deployments?
Yes, our solution supports both deployment models. The cloud-hosted option requires no additional infrastructure and can be deployed immediately using our managed service. For organizations preferring on-premises control, we offer a Docker-based gateway that includes Connector, Proxy, and Discovery components. The on-premises option also supports device discovery of unmanaged endpoints and reverse proxy routing.
What protocols does Secure Remote Access support and how are sessions secured?
Secure Remote Access supports RDP for Windows systems, SSH for Linux and Mac, and VNC for cross-platform screen sharing. All sessions use encrypted WebSocket connections and can be configured with multi-factor authentication. Optional video session recording captures complete screen activity for compliance review. Sessions include automatic expiry timers and inactivity timeouts to prevent forgotten connections.
How does the approval workflow function for remote access requests?
Remote access requests follow customizable approval workflows through the Admin By Request portal. When a user requests access, designated administrators receive notifications and can approve or deny requests through the web portal or mobile app. The system supports role-based access control, allowing different approval requirements based on user roles, target systems, or access types. For routine access patterns, administrators can configure automated approvals with specific conditions.
How does session recording and audit logging work in Secure Remote Access?
Every remote access session generates comprehensive audit logs including user identity, target system, session duration, protocols used, and approval trail. Optional video session recording captures complete screen activity during Remote Support sessions. Session metadata includes contextual information like user roles and approval workflows. All data can be exported for SIEM integration or compliance reporting.
Can Secure Remote Access integrate with existing authentication and identity management systems?
Yes, our solution integrates with Azure AD, SAML providers, and Office365 for single sign-on authentication. This allows users to authenticate with their existing corporate credentials rather than managing separate accounts. SSO integration also enables conditional access policies and centralized user management. The system supports multi-factor authentication requirements and can enforce additional verification steps before initiating remote sessions.
What are the main differences between traditional RDP deployments and Admin By Request's Secure Remote Access?
Traditional RDP deployments typically require direct network connections, open firewall ports, and persistent VPN tunnels that create security risks. While our Secure Remote Access still uses RDP as a protocol for Windows connections, we eliminate these vulnerabilities by brokering sessions through secure tunnels with outbound-only connections. Browser-based access eliminates RDP client software requirements, and unlike traditional RDP’s static credentials, every connection requires explicit approval rather than assumed access.