Recently Updated Pages
Manual Access
Default deny is the best way to live. However sometimes you need to manually grant access for a n...
Windows Firewall
Microsoft Windows comes equipped with a built-in native firewall which Knocknoc orchestrates to p...
IPSet (Linux Netfilter/IPTables)
Linux comes equipped with a built-in native firewall which Knocknoc orchestrates via "IPSets". IP...
Updates and upgrades
The Knocknoc software is managed by your operating system, as such updates can be managed within ...
Sonicwall
The Sonicwall can be orchestrated in three ways, Actively (API call from an Orchestration Agent t...
Windows Agent Installation
On a Windows machine as an Admin, download and install the Orchestration Agent. It will install a...
SAML with EntraID (Azure AD)
The following example assumes your Knocknoc instance is located at https://<hosting instance>.kno...
Fortigate Address Groups (Fortinet)
TheĀ FortiOS integration allows Knocknoc to dynamically add and remove user's source IP from a na...
Break Glass
Default deny is a wonderful thing, the best place to be - except when you lock yourself out. Than...
Linux Agent Installation
On a Linux host as Root, execute the below command to setup and install a Knocknoc Agent. You wil...
Agent installation
The Orchestration Agent runs on a server to control network access for users on their behalf. Thi...
v25.12
Knocknoc 25.12 Knocknoc 25.12 is a Windows-first release focused on making Just-In-Time (JIT) ac...
AWS (EC2) Security Groups
Knocknoc can orchestrate Amazon AWS Security Groups, which essentially provide network level fire...
Custom Script
The "Custom Script" Knoc type is simply a script the agent can execute directly on the Agent mach...
Moving from SQLite to PostgreSQL
If you installed Knocknoc Server before version 8.5 (September 2025), your instance is likely usi...
Server installation (on premise)
On a Linux host as Root, execute the below command to setup and install your Knocknoc server. You...
Create users
User creation varies depending on the authentication source in use. "SAML users" are created on-t...
Windows Servers
Windows Servers and RDP/WinRM - removing pre-auth attack surface A mid-sized business utilizes R...
Use cases (overview)
Knocknoc use cases Knocknoc is extremely versatile and can enable just in time network access co...
How Knocknoc removes attack surface
Knocknoc enables you to remove the attack surface of systems, by enacting just-in-time network/ap...