Skip to main content

Remote Access

IT Agent Remote Access provides secure, real-time access to managed computers using a purpose-built desktop Receiver and a hardened agent architecture.

Updated over a week ago

Overview

Remote Access allows an authorized user to securely view or control the desktop of a managed computer.

The system is designed around four core principles:

  • Strong identity verification

  • Short-lived, least-privilege credentials

  • Automatic connectivity selection

  • No inbound firewall requirements

All remote sessions are explicitly initiated by an authenticated user and are fully attributable.


🧩 Components Involved

A Remote Access session involves three coordinated components:

IT Agent Platform (Web)

  • Authenticates users

  • Authorizes remote sessions

  • Issues short-lived credentials

  • Coordinates relay connections when required

Receiver (Admin-side Desktop App)

  • Runs on the administrator’s machine

  • Authenticates using platform-issued credentials

  • Establishes the remote desktop connection

Agent / Sender (Target Computer)

  • Runs persistently on the managed computer

  • Maintains a secure outbound connection to the platform

  • Streams desktop data only when authorized


▶️ Starting a Remote Access Session

  1. Navigate to the Devices page in the IT Agent portal

  2. Select a computer that is currently online

  3. Click Start Remote Access

What happens next:

  • Your browser launches the Receiver app automatically

  • The Receiver authenticates using a short-lived token

  • Connection details are fetched from the platform

  • The remote desktop session is established

If the Receiver is not installed, IT Agent will prompt you to download the correct version for your operating system.


🔑 Authentication & Identity Model

IT Agent Remote Access uses layered authentication to ensure both users and devices are strongly verified.

User authentication

  • Users must be logged into the IT Agent platform

  • A short-lived authentication token is securely passed to the Receiver

Receiver identity

  • The Receiver does not store long-term credentials

  • It requests a short-lived client certificate from the platform

  • Certificates are generated and rotated automatically

Agent identity

  • Each managed computer has its own cryptographic identity

  • The agent presents its certificate during session setup

Mutual verification


Before a session is allowed:

  • Both the Receiver and the Agent are verified

  • Both must belong to the same organization

  • Certificates must be valid and unexpired

This prevents unauthorized tools or machines from participating in a session.


🧾 Certificate Design (Security Details)

Remote Access uses ephemeral client certificates rather than static or long-lived keys.

Key characteristics:

  • Issued on demand

  • Valid for a short duration (hours, not days)

  • Automatically regenerated when required

  • Bound to both user identity and organization

This design minimizes risk and aligns with modern zero-trust security practices.


🌐 Connection Establishment Flow

Once authenticated, the Receiver requests connection details from the platform.

The platform responds with:

  • One or more direct connection candidates

  • Optionally, a relay endpoint (when enabled)

The Receiver then attempts to connect using the best available option.


⚡ Direct Connections (Preferred)

Whenever possible, the Receiver connects directly to the agent.

Benefits:

  • Lowest latency

  • Best performance

  • No intermediary systems involved

Direct connections are always attempted first.


🔁 Relay Connections (Automatic Fallback)

If a direct connection is not possible (for example, due to NAT or firewall restrictions), IT Agent can automatically use a secure relay connection.

Relay behavior:

  • Relay sessions are started on demand

  • The agent connects outbound-only to the relay

  • The Receiver connects to the same relay endpoint

Important properties:

  • No inbound ports required

  • No firewall rule changes needed

  • Relay sessions are temporary and scoped to a single session

If a relay cannot be established, the system safely falls back without exposing the agent.


👀 Session Visibility & Control

While a Remote Access session is active:

  • The computer is marked as actively accessed

  • Administrators can see who is connected

  • Connection duration is visible

This ensures transparency and accountability within the organization.


🧑‍💼 Ad-hoc Remote Support Sessions

IT Agent supports ad-hoc remote sessions for temporary or user-initiated support.

With ad-hoc sessions, you can:

  • Create a scheduled or one-time session

  • Share a secure access link or code

  • Provide support without permanent agent installation

Ad-hoc sessions:

  • Are time-limited

  • Use the same authentication and security model

  • Do not require persistent access


🌍 Network & Firewall Requirements

IT Agent Remote Access is designed for restrictive environments.

Requirements:

  • Outbound HTTPS access from the agent

  • No inbound firewall rules

  • No port forwarding

All coordination occurs over secure outbound connections.


🛠️ Troubleshooting

Receiver does not launch

  • Ensure the Receiver is installed

  • Download the latest Receiver if needed

  • Restart your browser and try again

Connection fails

  • Verify the computer is online

  • Confirm the agent service is running

  • Retry the session (credentials refresh automatically)

Intermittent issues

  • Logging out and back in refreshes authentication

  • Restarting the Receiver regenerates certificates

If problems persist, contact support with the computer name and approximate time of the issue.


🧠 Why This Architecture Matters

IT Agent Remote Access is intentionally designed to:

  • Avoid static credentials

  • Minimize long-lived trust

  • Reduce network exposure

  • Provide clear session attribution

  • Scale securely across organizations

This approach delivers powerful remote access without compromising security posture.


✅ Summary

Remote Access in IT Agent provides:

  • Certificate-based authentication

  • Automatic connection selection (direct or relay)

  • Strong identity verification on both ends

  • Transparent session visibility

  • Support for permanent and ad-hoc access

Did this answer your question?