Documentation
Solutions Guide
VPN Replacement
Replace legacy VPNs with zero-trust infrastructure access. Better security, better performance, easier management.
Estimated time: 45 minutes
VPN vs TigerAccess
Legacy VPN
TigerAccess
Network-level access
Resource-level access
Static credentials
Short-lived certificates
Complex configuration
Minutes to deploy
Single point of failure
Distributed architecture
Split tunneling risks
Direct secure connections
Limited visibility
Complete audit logs
Migration Steps
1
Deploy TigerAccess Infrastructure
Set up the TigerAccess cluster.
# Deploy auth service
tigeraccess start --roles=auth \
--config=/etc/tigeraccess/config.yaml
# Deploy proxy service (public facing)
tigeraccess start --roles=proxy \
--auth-server=auth.company.com:3025 \
--public-addr=access.company.com:4432
Register Resources
Connect your resources to TigerAccess.
# Deploy agents on servers
tigeraccess start --roles=agent \
--auth-server=auth.company.com:3025
# Register databases
tacctl db add prod-postgres \
--protocol=postgres \
--uri=postgres.internal:5432
# Register K8s clusters
tacctl kube add prod-cluster \
--kubeconfig=/path/to/kubeconfig3
Migrate Users from VPN
Transition users to TigerAccess.
# Connect to identity provider
tacctl sso configure oidc \
--issuer=https://login.company.com \
--client-id=tigeraccess
# Import existing groups
tacctl users sync --source=ldap
# Create role mappings
tacctl roles create developer \
--allow-logins=ubuntu \
--allow-labels=env:dev,env:staging4
Configure Access Policies
Define zero-trust access rules.
tacctl create -f - <<EOF
kind: role
metadata:
name: remote-worker
spec:
allow:
logins: [ubuntu, ec2-user]
node_labels:
env: [dev, staging, production]
options:
require_session_mfa: true
max_session_ttl: 8h
record_session:
default: strict
EOF5
Decommission VPN
Verify access and remove VPN.
# Verify all resources accessible via TigerAccess
tac ls
# Test access to critical resources
tac ssh user@prod-server-1
tac db connect prod-postgres
tac kube get pods
# Decommission VPN
# 1. Notify users of migration date
# 2. Revoke VPN credentials
# 3. Remove VPN infrastructureVPN Replaced
With VPN replaced by TigerAccess, you have:
- Resource-level access, not network access
- No VPN infrastructure to maintain
- Better user experience
- Complete visibility and audit trail