Skip to main content

Introduction

Welcome to the Knocknoc Admin Guide.

This is an advanced guide and covers installation, administration, tuning and troubleshooting.

YourFor usersgeneral mightaccess beguides, morehere interested inis the super-simplesimplified User Guide.

Setting up Knocknoc for the first time can appear easy, but it is important to understand how it fits into your whole security architecture. Knocknoc is an important component in reducing your attack surface, and allows you fine grained control over what resources each of your users can access. In most cases Users are generally expected to authenticate to thosethe target resources as well, in most cases, so please consider Knocknoc as part of a comprehensive defence in depth strategy. In someother cases, like video feeds, or SIP connections, extra authentication isn't workable, so you need to decide as part of your security strategy how to manage thethese risks.

Please have a read through the following sections,guides, or jump straight the topic thatyou interestsare you:searching for:

Getting Started
Access Control
Installing Knocknoc Server
Installing Knocknoc Agent
Configuring Backends
Authentication

The architecture of a typical Knocknoc environment is often as follows:

Typical knocknoc env.drawio (1).pngTypical knocknoc env.drawio (2).png