Skip to content

Using Vendor Access

Vendor Access, also known as access.work, is a feature of Secure Remote Access that allows users to connect to devices through their browsers without needing access to the Admin By Request Portal.


To quickly start using access.work, follow these essential steps:

StepActionRequirement
1. Enable Unattended AccessChoose between managed service or self-hosted implementationManaged service recommended for quicker setup
2. Configure SSOSet up users for Single Sign-On in the portalNavigate to Logins > Single Sign-on Setup
3. Access Vendor PortalNavigate to access.work in browser and sign in with SSOValid SSO credentials required

Ideal for: Organizations seeking rapid deployment without requiring users to access the main AdminByRequest portal.


Note: At the time of writing, if you want to use access.work alongside on-premise gateways in a self-hosted implementation, these gateways need to be running Unattended Access v2.1.0 or later.


These steps provide comprehensive information for analyzing inventory, configuring remote access gateways, and setting up users with correct access permissions.

TaskLocationAction
Computer Inventory CheckAdmin Portal main interfaceReview and verify all endpoint devices
Gateway ConfigurationSRA > Settings > Unattended Access Settings > Gateways > CLOUDCorrelate inventory with accessible computers
Network Scope ValidationGateway settingsEnsure proper network segmentation and access
TaskLocationKey Considerations
User Login SetupLogins > User LoginsConfigure appropriate access levels and gateway assignments
Scope CreationUser profile > SCOPE tabDefine which computers each user can access
Access PreviewUser list > Preview linkVerify users can only access expected computers

Important: The Preview link appears only if a scope is created for the user (SCOPE tab). If no scope is created, the user will have access to all computers controlled by the gateway.

StepActionExpected Result
Test User LoginNavigate to access.work in browserSuccessful SSO authentication
Computer List VerificationBrowse available computersList matches expected scope from Phase 2
Access TestingAttempt connection to authorized computersSuccessful connection without errors

When connecting to remote computers, different icons indicate the access status:

IconStatusMeaning
Key IconCredentials RequiredUser must provide login credentials for the target system
Locked IconApproval RequiredAccess request must be approved before connection
Unlocked IconPre-Approved AccessImmediate connection available without additional approval
FeatureImplementationUser Experience
In-Browser NotificationsAll notifications and data input handled within browser interfaceSeamless experience without external dependencies
Email NotificationsOptional notifications via email client if runningAdditional awareness for users not actively in browser
Admin Approval InterfaceRequests appear under Requests menu (PENDING tab)Consistent approval process for all access types

CapabilityLocationFunction
Activity MonitoringPortal > AuditlogReal-time tracking of all remote access sessions
Session RecordingSRA > Settings > Unattended Access Settings, RECORDING tabOptional video recording of all user actions
Video PlaybackAuditlog > Expand relevant session > Request videoPost-session review for compliance and training
SettingOptionBusiness Impact
Recording StatusOn/OffEnables/disables session video capture
Video QualityAdjustable settingsBalance between storage requirements and detail level
Retention PeriodConfigurable timeframeCompliance with data retention policies

ConfigurationSettingSecurity Benefit
Network SegmentationDefine specific network rangesLimits access to authorized network segments
IP WhitelistingRestrict access by IP addressPrevents unauthorized location access
Time-Based AccessSet access windowsReduces risk of after-hours unauthorized access
Access LevelPermissionsUse Case
Full AccessConnect to all assigned computersStandard vendor access requirements
View-Only AccessMonitor without control capabilitiesSupport scenarios where control is not needed
Temporary AccessTime-limited permissionsShort-term support or project-based work

IssuePossible CauseResolution
No Computers VisibleIncorrect scope configurationReview and adjust user scope settings
Connection FailedGateway connectivity issuesVerify gateway status and network connectivity
Approval DelaysApprovers not receiving notificationsCheck notification settings and approver availability
Recording Not WorkingRecording feature disabledEnable recording in Unattended Access settings

PracticeImplementationBenefit
Regular Scope ReviewsPeriodic audit of user access permissionsMaintains security hygiene
Gateway MonitoringContinuous monitoring of gateway statusEnsures high availability
Session RecordingEnable recording for all vendor sessionsProvides audit trail and compliance documentation
User TrainingEducate vendors on proper access proceduresReduces support requests and improves security

Key Takeaway: Vendor Access (access.work) provides a streamlined, secure method for external users to connect to organizational resources without requiring access to the main AdminByRequest portal, while maintaining comprehensive security controls and audit capabilities.


Here is a 3-minute overview of Vendor Access capabilities and setup procedures.

Note: Demo video link should be inserted here when available.