Access Protocols

Unified Access to Your Infrastructure

One platform to secure SSH, databases, Kubernetes, Windows, web apps, and Git. Consistent policies, complete visibility.

Unified Security

Consistent security policies across all access protocols.

Complete Visibility

Audit logs and session recording for every connection.

Certificate Auth

Short-lived certificates eliminate credential sprawl.

FAQ

Frequently Asked Questions

What protocols does TigerAccess support?

TigerAccess supports SSH, 15+ database protocols (PostgreSQL, MySQL, MongoDB, Redis, etc.), Kubernetes, Windows RDP, web applications via HTTPS, and Git repositories via SSH/HTTPS.

How does certificate-based authentication work?

TigerAccess issues short-lived X.509 certificates (1-12 hours) instead of static passwords or keys. Certificates are automatically rotated and include embedded RBAC policies, eliminating credential sprawl and reducing attack surface.

Can I record all sessions for compliance?

Yes. TigerAccess records SSH, RDP, database queries, and kubectl commands with complete session replay. Recordings are stored in object storage and indexed for search and compliance auditing.

How do you enforce security policies across different protocols?

TigerAccess uses a unified RBAC engine that applies consistent policies across all protocols. Policies are defined once and enforced at the proxy layer, ensuring SSH, database, and Kubernetes access all follow the same security rules.

What happens if the TigerAccess proxy goes down?

TigerAccess supports high availability with multiple proxy instances. Active sessions continue through healthy proxies, and automatic failover ensures minimal disruption. Certificates remain valid until expiry.

Can I integrate with existing identity providers?

Yes. TigerAccess integrates with OIDC, SAML, Active Directory, LDAP, Okta, Google Workspace, Azure AD, and other identity providers. Users authenticate once and receive certificates for infrastructure access.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available