Available Documentation
System Documentation
System Documentation Management interface
User Access Gateway User connections portal
API Documentation System integration API
Download PDF System Documentation PDF
Search in this documentation
Table of Contents
  • About Documentation
  • Layout Themes of the Admin Panel
  • Introduction
    • System Overview
      • Session Monitoring & Recording
      • Secret Management
      • Just-in-time (JIT) Access
      • Single Sign-on (SSO)
      • Agentless Convenient Access
      • Ai-powered Prevention
      • Productivity Analyzer
      • Rapid Deployment
      • Compliance Support
    • Available GUI Languages
    • Licensing
    • Supported Protocols
      • HTTP
      • Modbus
      • MS SQL (TDS)
      • MySQL
      • PostgreSQL
      • RDP
      • SSH
      • Telnet 3270
      • Telnet 5250
      • Telnet
      • VNC
      • X11
      • TCP
      • Secret Checkout
    • Deployment Scenarios
    • Connection Modes
    • User Authentication Methods and Modes
    • Security Measures
      • Data Encryption
      • Backups
      • Permissions
      • Sandboxing
      • Reliability
      • Cluster Configuration
    • Data Model
    • Dashboard
      • Widgets
      • Adding, Customizing and Removind Dashlets
      • Hard Drives Status Information
    • Third-Party Licenses
  • System Deployment
    • Requirements
    • Hardware Overview
    • System Initiation
      • Virtual Machine
    • Accessing Fudo Enterprise Portals
      • Admin Panel
      • User Access Gateway
      • Supported Web Browsers
  • Quick Start
    • SSH
      • Prerequisites
      • Configuration
      • Establishing Connection
      • Viewing User Session
    • SSH in Bastion Mode
      • Prerequisites
      • Configuration
      • Establishing Connection
      • Viewing User Session
    • SSH in Bastion Mode with Jump Host Option
      • Prerequisites
      • Configuration
      • Establishing a Connection
    • RDP
      • Prerequisites
      • Configuration
      • Establishing an RDP Connection with a Remote Host
      • Viewing User Session
    • RDP in Bastion Mode
      • Prerequisites
      • Configuration
      • Establishing an RDP Connection with a Remote Host
      • Viewing User Session
    • Telnet
      • Prerequisites
      • Configuration
      • Establishing a Telnet Connection with the Remote Host
      • Viewing User’s Session
    • Telnet 5250
      • Prerequisites
      • Configuration
      • Establishing a Telnet Connection with the Remote Host
      • Viewing User’s Session
    • PostgreSQL
      • Prerequisites
      • Architecture Overview
      • Configuration Steps
      • Establishing PostgreSQL Connection
    • MySQL
      • Prerequisites
      • Configuration
      • Establishing Connection with a MySQL Database
      • Viewing User Session
    • MS SQL
      • Prerequisites
      • Configuration
      • Establishing Connection with a MS SQL Database
      • Viewing User Session
    • HTTP
      • Prerequisites
      • Configuration
      • Connecting to Remote Resource
      • Viewing User Session
    • VNC
      • Prerequisites
      • Configuration
      • Establishing Connection
      • Viewing User Session
  • Sessions
    • Filtering Sessions
      • Defining Filters
      • Saving Custom Filters
      • Applying Custom Filters
      • Editing Custom Filters
      • Disabling Filters
      • Deleting Custom Filters
      • Full Text Search
    • Viewing Sessions
    • Pausing Connection
    • Terminating Connection
    • Joining Live Session
    • Sharing Sessions
    • Commenting Sessions
    • Sessions’ Retention Lockdown
    • Exporting Sessions
      • Export Session File Formats
    • Deleting Sessions
    • OCR Processing Sessions
    • Session Data Replication
    • Session Timestamping
    • Require Approval for Access
      • Approving Pending User Requests
      • Declining Pending Requests
    • AI Behavioral Analysis in Sessions
    • Ai Session Summary [BETA]
  • Access Requests
    • Awaiting Requests
    • Active Requests
    • Archived Requests
  • Reports
    • System Reports
    • User Reports: Periodic and On-Demand
    • List of Predefined Reports
    • Subscribing to a Periodic Report
    • Unsubscribing from a Recurring Report
    • Generating a Report on Demand
    • Viewing and Saving Reports
    • Deleting Reports
  • User Management
    • Users
      • Creating a User
      • Editing a User
      • Blocking a User
      • Unblocking a User
      • Deleting a User
      • Authentication Failures Counter
    • Groups (RBAC)
      • Access Resolution and Prioritization
      • Creating Group
      • Modifying Groups
      • Deleting Groups
    • Role-Based Access Control (RBAC)
      • Transition to RBAC After Upgrade
        • Understanding Privileges and Capabilities
        • Predefined Roles as a Starting Point
      • Creating Role
      • Assigning Roles to Users
      • Modifying Roles
      • Deleting Roles
      • Typical Role Scenarios and Required Privileges
        • Tab-Level Access Control Matrix
        • Dashboard Widgets Visibility
        • Sessions Tab Permissions
        • Downloads Tab Permissions
        • Safes Management
        • Discovery Tab Permissions
        • Access Request Permissions
        • Fudo Officer
        • Reports Tab Permissions
  • Session Management
    • Servers
      • Creating a Server
        • Creating an HTTP Server
        • Creating a Modbus Server
        • Creating a MS SQL Server
        • Creating a MySQL Server
        • Creating a PostgreSQL Server
        • Creating an RDP Server
        • Creating an SSH Server
        • Creating a Telnet Server
        • Creating a Telnet 3270 Server
        • Creating a Telnet 5250 Server
        • Creating a VNC Server
        • Creating a TCP Server
      • Port Ranges in Server Configuration
        • Configuring a Port Range
        • Server Configuration Prioritization in Case of Conflict
      • Use SSH Tunnel - SSH Reverse Tunnel Server Configuration
      • Importing a Server List from CSV File
      • Editing a Server
      • Blocking a Server
      • Unblocking a Server
      • Deleting a Server
    • Pools
      • Creating a Pool
      • Deleting a Pool
    • Accounts
      • Creating an Account
        • Creating an Anonymous Account
        • Creating a Forward Account
        • Creating a Regular Account
      • Editing an Account
      • Blocking an Account
      • Unblocking an Account
      • Deleting an Account
      • Managing Security Alerts
        • Triggering Password Change
        • Ignoring Security Alert
    • Listeners
      • Creating a Listener
        • Setting up the SSH Listener
        • Setting up the RDP Listener
        • Setting up the VNC Listener
        • Setting up the HTTP Listener
        • Setting up the Modbus Listener
        • Setting up the MySQL Listener
        • Setting up the PostgreSQL Listener
        • Setting up the TCP Listener
        • Setting up the MS SQL Listener
        • Setting up the Telnet Listener
        • Setting up the Telnet 3270 Listener
        • Setting up the Telnet 5250 Listener
      • Editing a Listener
      • Blocking a Listener
      • Unblocking a Listener
      • Deleting a Listener
    • Safes
      • Creating a Safe
      • Editing a Safe
      • Blocking a Safe
      • Unblocking a Safe
      • Deleting a Safe
    • Discovery
      • Creating a Rule
        • Creating a Rule for Accounts
        • Creating a Rule for Servers
      • Managing Rules
      • Creating a Scanner
        • Creating a Scanner for Domain Controller Accounts
        • Creating a Scanner for Domain Controller Servers
        • Creating a Scanner for Local Accounts
      • Managing Scanners
      • Managing Discovered Accounts
      • Managing Discovered Servers
    • Remote Applications
      • Adding Remote Application
      • Adding Arguments
      • Connecting to Remote Application via Access Gateway
      • Granular Access to Remote Applications
      • Deleting Remote Application
    • Policies
      • Ai Module-Based Policy
      • Ai Module-Based Policy Examples
      • Regular Expression-Based Policy
    • Downloads
      • Sessions
      • Files
    • Productivity
      • Overview
      • Sessions Analysis
      • Activity Comparison
  • Password Vault
    • Overview
      • Architecture Overview – Security Model
      • Password Vault Structure
      • Event Logging and Audit Trail
    • Collections
      • Creating Collections
      • Nesting Collections
      • Accessing Collection Editing
        • Edit Collection Panel
      • Assigning Users and Groups to Collections
      • Managing Collection Object Rights
        • Assigning Object Rights to Users
        • Assigning Object Rights to Roles
      • Collection Notifications
      • Deleting Collections
    • Secrets
      • Creating Secrets
      • Importing Secrets
      • Accessing Secret Editing
        • Edit Secret Panel
      • Moving Secrets Between Collections
      • Deleting Secrets
      • Assigning Password Vault Secrets to Accounts
    • Secret Access Monitoring
      • Event Types and Status Indicators
      • Filtering and Reviewing Events
    • Password Changers
      • Password Changer Policy
        • Defining a Password Changer Policy
        • Editing a Password Changer Policy
        • Deleting a Password Changer Policy
      • Custom Password Changers
        • Defining a Custom Password Changer
        • Editing a Custom Password Changer
        • Deleting a Custom Password Changer
      • Importing and Exporting Password Changers
        • Exporting a Password Changer
        • Importing a Password Changer
      • Connection Modes
        • SSH
        • LDAP
        • Telnet
        • WinRM
      • Setting up Password Changing on a Unix System
  • Settings
    • System
      • Date and Time
      • SSL Certificates
      • SSH Access
      • Configuration Encryption
      • SNMP
        • Configuring SNMP
        • Configuring SNMPv3 TRAP
        • SNMP MIBs
        • Getting SNMP readings using snmpwalk
        • Fudo Enterprise Specific SNMP Extensions
      • Trusted Timestamping
      • Password Changers - Active Cluster Node
        • Cluster Password Changers
      • Sensitive Features
      • Configuring an HTTP Proxy
      • System Update
        • Updating System
        • Restoring Previous System Version
        • Deleting Upgrade Snapshot
      • Hotfix
      • License
      • Diagnostics
      • Exporting/Importing System Configuration
        • Exporting System Configuration
        • Importing System Configuration
    • Network Settings
      • Reverse Proxy
        • Prerequisites
        • Configuration Steps
        • User Access Gateway Connections
        • Enabling and Disabling Reverse Proxy
        • Reverse Proxy Status Indicators
        • SSH Tunnel Operation
        • Workflow Recommendation
        • Internal Routing Behavior
        • Security Considerations
        • Troubleshooting
      • Network Interfaces Configuration
        • Managing Physical Interfaces
        • Defining IP Address Using System Console
        • Setting up Virtual Networks (VLAN)
        • Setting up Link Aggregation (LACP)
      • Labeled IP Addresses
      • Routing Configuration
      • DNS Configuration
      • ARP Table Configuration
    • Notifications
      • Configuring the SMTP Server
    • Artificial Intelligence (AI)
      • AI Behavioral Analysis
        • Configuring Models Trainers
        • Behavioral Analysis Models
      • AI Session Summary [BETA]
    • Authentication
      • External Authentication Server Definition
        • Active Directory
        • LDAP
        • Cerb
        • Radius
        • Assigning an External Authentication Method to a User
        • Second Authentication Factor
      • OpenID Connect Authentication Definition
      • Global Authentication Settings
        • Default Domain
        • Deny New Connections
        • Password Complexity
        • OATH Authentication Definition
        • SMS Authentication Definition
        • DUO Authentication Definition
        • Single Sign On
        • Kerberos Authentication Settings
    • External Passwords Repositories
      • CyberArk Credential Provider
      • Thycotic Secret Server
      • Local Administrator Password Solutions (LAPS)
    • External Storage
      • Configuring External Storage
    • Resources
      • RDP/SSH/VNC Login Screen Configuration
      • User Portal Configuration
        • Login Screen Configuration
        • Predefined Keyboard Layout
    • Backup and Retention
      • Session Data Backup
      • Data Retention
    • Cluster Configuration
      • Session Data Replication and Behavior in the Event of a Node Failure
      • Cluster Initialization
      • Adding Cluster Nodes
        • Cluster Initialization and Adding Nodes
        • Setting Relationships Between Nodes
        • Linking Nodes with the Initial Node
        • Cluster Initialization Completion Verification
      • Cluster Expansion with New Nodes
      • Editing Cluster Nodes
      • Removing Cluster Nodes
        • Removing a Node from the Cluster
        • Rejoining a Removed Node
      • Redundancy Groups
      • Checking Session Replication Status
    • Users Synchronization - User Directory
      • Configuring Users Synchronization Service
      • Disabling Data Synchronization for User
      • Kerberos Support for Active Directory
    • Certificate-based Authentication Scheme
    • Login Timeout
    • System Version Restore
    • System Reboot
    • Changing Encryption Passphrase
    • Integration with CERB Server
    • System Maintenance
      • Backing up Encryption Keys
      • Monitoring System Condition
      • Health Check
        • API Health Check
      • Callhome
        • Data Collected by Callhome Service
        • The Benefits of Using Callhome
        • Enable/Disable Callhome
      • Hard Drive Replacement
      • Resetting Configuration to Default Settings
  • Events Log
    • Filtering Logs by Date and Time
    • External Syslog Servers
    • Exporting Events Log
  • Account Activity in the User Access Gateway (UAG)
  • Reference Information
    • RDP Connections Broker
    • Log Messages
    • Footer Information
  • Fudo Officer 2.3
    • Configuration
    • Managing Profiles
      • Add New Profile
      • Switch Profiles
      • Edit Profile
      • Delete Profile
    • Managing Session Requests
      • Awaiting Requests
      • Active Requests
      • Revoking Request
      • Archived Requests
    • Notifications
      • Configuring Application Notifications
    • Settings
      • Biometric Authentication
      • Change PIN Code
      • Two-Factor YubiKey Authentication
      • Language
  • Fudo ShareAccess
    • Data Model
    • Pairing Fudo Enterprise with Fudo Shareaccess
    • License
      • Trial License Activation
      • Requesting a License
      • Uploading License File
    • Manage Fudo ShareAccess Members
      • Inviting Members
      • Verifying Members Status
      • Creating an Account Without an Invitation
      • Revoking Members Status
      • Deleting Members
    • Manage Access to Resources
  • Client Applications
    • PuTTY
    • Microsoft Remote Desktop
    • TightVNC Viewer
    • SQL Server Management Studio
  • Troubleshooting
    • Booting Up
    • Connecting to Servers
    • Logging to Administration Panel
    • Session Playback
    • Cluster Configuration
    • Trusted Timestamping
    • Support Mode
  • Use Cases
    • Two-Factor OATH Authentication with Google Authenticator
      • Protocols Supporting OATH Authentication Method
      • Configuring the OATH Authentication Method
    • OpenID Connect Authentication Definition with Microsoft Entra (Azure)
    • Remote Desktop Services Configuration on Windows Server for Fudo Enterprise
      • Setup Remote Desktop Services (RDS) on Windows
      • Setup Fudo Enterprise - Bastion Scenario (Recommended)
      • Setup Fudo Enterprise - Proxy Scenario
    • Custom RDP Hostname in the Session Title
      • DNS Configuration in Windows DNS Manager
      • Fudo Enterprise Configuration
      • Start RDP Connection
      • Result
    • Managing RDP Server Certificates in Windows Server
      • Locating the Server Certificate in Windows Server
      • Providing the CA Certificate
    • Configuring the Single Sign On (SSO)
      • SSO Configuration on Windows Server 2019
      • Setup Fudo Enterprise
      • Setup and Check User Workstation - Windows2010 Client
    • Handling Local Account Password Changes Using a Domain Account with WinRM Password Changer
      • Hostname and DNS Server Configuration
      • Adding a KDC Server
      • Server Configuration
      • Adding a Password Change Policy
      • Administrator Account
      • Account for Which the Password Will Be Changed
    • Configuring Kerberos Constrained Delegation for MSSQL(TDS) Server
      • Kerberos Authentication Configuration on Windows Server
      • Setup Fudo Enterprise
      • Establish a Connection
    • Establishing Connections to Servers via SSH Tunnel in Fudo Enterprise
      • General Requirements
        • Establishing an SSH Connection
        • Establishing an HTTP Connection
        • Connecting to an Oracle Database
        • Connection to a Server with Reverse Tunnel via Tunnel-type Listener
  • Frequently Asked Questions
  • Glossary
Fudo Enterprise 6.0
  • Start »
  • Search
  • 🇵🇱 PL


© Copyright 2025, Fudo Security Inc.