Documentation
Solutions Guide

Infrastructure Access

Unified access to all your infrastructure—servers, databases, Kubernetes, and cloud—through a single identity-based platform.

Estimated time: 30 minutes

Supported Protocols

SSH

Certificate-based SSH with session recording

Databases

PostgreSQL, MySQL, MongoDB, Redis, and 15+ more

Kubernetes

kubectl, exec, and port-forward with RBAC

Cloud

AWS, Azure, GCP console and API access

Setup Steps

1

Deploy TigerAccess Cluster

Start auth and proxy services for your infrastructure.

# Start auth service
tigeraccess start --roles=auth --config=/etc/tigeraccess/config.yaml

# Start proxy service
tigeraccess start --roles=proxy --auth-server=auth.company.com:3025
2

Register SSH Servers

Deploy agents on servers you want to access.

# On each server
tigeraccess start --roles=agent \
  --auth-server=auth.company.com:3025 \
  --labels=env=production,team=platform
3

Configure Database Access

Register databases with the proxy service.

tacctl create -f - <<EOF
kind: db
metadata:
  name: prod-postgres
  labels:
    env: production
spec:
  protocol: postgres
  uri: postgres.internal:5432
  admin_user:
    name: tigeraccess-admin
EOF
4

Add Kubernetes Clusters

Register K8s clusters for kubectl access.

tacctl create -f - <<EOF
kind: kube_cluster
metadata:
  name: prod-cluster
spec:
  kubeconfig: /etc/tigeraccess/kubeconfig
EOF
5

Connect to Resources

Access any resource with unified commands.

# SSH access
tac ssh user@server-name

# Database access
tac db connect prod-postgres

# Kubernetes access
tac kube get pods -n production

# List available resources
tac ls

Infrastructure Access Enabled

With unified infrastructure access configured, you gain:

  • Single identity across all infrastructure
  • No VPNs or bastion hosts required
  • Certificate-based access with auto-rotation
  • Complete audit trail for compliance