Skip to main content

Introduction

Welcome to the Knocknoc Admin Guide. This covers installation, administration, tuning and troubleshooting.

Your users are might be more interested in the super-simple User Guide.

Setting up Knocknoc for the first time can appear easy at first, but it is important to understand how it fits into your whole security architecture. Knocknoc is an important component in reducing your attack surface, and allows you fine grained control over what resources each of your users can access. Users are generally expected to authenticate to those resources as well, in most cases, so please consider Knocknoc as part of a defence in depth strategy. In some cases, like video feeds, or SIP connections, extra authentication isn't workable, so you need to decide as part of your security strategy how to manage the risks.

Please have a read through the following sections, or jump straight the topic that interests you:

Getting Started
Installing Knocknoc Server
Installing Knocknoc Agent
Configuring an example Backend
Adding Users
configureing SAML

The architecture of a typical Knocknoc environment is often as follows: