Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Thycotic Secret Server - SSH Proxy (Tunneling) & RDP Proxy

1/5/2021

0 Comments

 
Thycotic Secret Server - SSH Proxy (Tunneling) & RDP Proxy
All SSH sessions in any Secret Server edition can be set up to proxy through Secret Server for greater control and logging capabilities. Set up firewall rules to ensure that privileged account access only comes from the Secret Server machine.







Traffic FlowChart

1  SSH Proxy



2  RDP Proxy









Normal Traffic 













SSH Proxy Traffic











SSH Proxy


Steps:
1  Enable SSH Proxy


2  Enable Proxy in Secret Policy


3  Apply Secret Policy and Test





SSH Tunneling







RDP Proxy

There are two methods to use RDP Proxy
1  RDP Proxying using SSH Proxy and SSH Tunneling
The RDP Proxying feature allows RDP connections, established using the launcher, to be routed through Secret Server. It does this using a SSH tunnel, created using SSH local client port forwarding, from the client's machine to the Secret Server SSH Proxy.


How it works
1. The user clicks the RDP launcher in Secret Server.
2. The launcher executes on the client's machine.
3. The launcher establishes a connection to the SSH Proxy using unique credentials generated for the session. These credentials are short lived and can only be used once.
4. Once the launcher has successfully authenticated with the SSH Proxy, the launcher will open a socket and listen for a connection on an available ephemeral port (the forwarding port) on the client's machine.
5. RDP launches on the client machine and connects locally to the forwarding port.
6. All RDP traffic for this session is now routed through the SSH tunnel to Secret Server, then forwarded to the target machine.
7. The RDP session is established.



2  RDP Proxying using RDP Proxy


How It Works
  1. The user clicks the RDP launcher in SS.

  2. The launcher executes on the client's machine.

  3. The launcher establishes a connection to the RDP Proxy using credentials generated for the session. These credentials are short lived and can only be used once.

  4. Once the launcher has successfully authenticated with the RDP proxy, the RDP proxy looks up the credentials and target hostname to connect to.

    Note: The secret credentials do not get served to the client machine in this flow, which improves credential security.

  5. The RDP proxy connects to the desired remote host with the secret credentials.

  6. The RDP session is established.

  7. RDP traffic is sent back and forth over the RDP proxy, session keystrokes are monitored if session recording is enabled.




References

  • SSH Proxy Configuration and Bandwidth
  • Secret Server: Using Connect As Command and SSH Proxy with PuTTY launcher
  • SSH Terminal Administration
  • SSH Proxy Configuration
  • RDP Proxy Configuration
  • Configuring SSH Proxies for Launchers
  • RDP Proxying - IBM 
  • CyberArk vs Thycotic

















via Blogger https://ift.tt/3ni8n8P
January 05, 2021 at 07:10PM Thycotic
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org