Documentation
Solutions Guide
Infrastructure Access
Unified access to all your infrastructure—servers, databases, Kubernetes, and cloud—through a single identity-based platform.
Estimated time: 30 minutes
Supported Protocols
SSH
Certificate-based SSH with session recording
Databases
PostgreSQL, MySQL, MongoDB, Redis, and 15+ more
Kubernetes
kubectl, exec, and port-forward with RBAC
Cloud
AWS, Azure, GCP console and API access
Setup Steps
1
Deploy TigerAccess Cluster
Start auth and proxy services for your infrastructure.
# Start auth service
tigeraccess start --roles=auth --config=/etc/tigeraccess/config.yaml
# Start proxy service
tigeraccess start --roles=proxy --auth-server=auth.company.com:30252
Register SSH Servers
Deploy agents on servers you want to access.
# On each server
tigeraccess start --roles=agent \
--auth-server=auth.company.com:3025 \
--labels=env=production,team=platform3
Configure Database Access
Register databases with the proxy service.
tacctl create -f - <<EOF
kind: db
metadata:
name: prod-postgres
labels:
env: production
spec:
protocol: postgres
uri: postgres.internal:5432
admin_user:
name: tigeraccess-admin
EOF4
Add Kubernetes Clusters
Register K8s clusters for kubectl access.
tacctl create -f - <<EOF
kind: kube_cluster
metadata:
name: prod-cluster
spec:
kubeconfig: /etc/tigeraccess/kubeconfig
EOF5
Connect to Resources
Access any resource with unified commands.
# SSH access
tac ssh user@server-name
# Database access
tac db connect prod-postgres
# Kubernetes access
tac kube get pods -n production
# List available resources
tac lsInfrastructure Access Enabled
With unified infrastructure access configured, you gain:
- Single identity across all infrastructure
- No VPNs or bastion hosts required
- Certificate-based access with auto-rotation
- Complete audit trail for compliance