Documentation

TigerAccess Documentation

Everything you need to deploy, configure, and use TigerAccess for privileged access management.

Quick Start

Get Started Quickly

Jump right in with our most popular guides.

Coming Soon

Getting Started

Deploy TigerAccess in minutes with our quick start guide.

Coming Soon

SSH Access

Set up secure SSH access with certificate authentication.

Coming Soon

Database Access

Connect to PostgreSQL, MySQL, MongoDB, and more.

Coming Soon

Kubernetes Access

Access K8s clusters with RBAC and auditing.

Documentation

Browse by Category

Find what you need organized by topic.

User Guides

Learn how to use TigerAccess as an end user.

  • Connecting to ResourcesComing Soon
  • Access RequestsComing Soon
  • Using the CLIComing Soon

Administration

Configure and manage your TigerAccess deployment.

  • User ManagementComing Soon
  • Role ConfigurationComing Soon
  • Policy ManagementComing Soon

Security

Security features and best practices.

  • Zero Trust SetupComing Soon
  • MFA ConfigurationComing Soon
  • Session RecordingComing Soon

AI Agents

Secure your AI agents and automation.

  • Agent IdentityComing Soon
  • Safety ControlsComing Soon
  • MCP ProtocolComing Soon

API Reference

Integrate with the TigerAccess API.

  • AuthenticationComing Soon
  • ResourcesComing Soon
  • EventsComing Soon

Need Help?

Can't find what you're looking for? Our team is here to help.