Recently Updated Pages
Channels and Beta
f you're after the very latest features or changes, and you know what you're doing - below is how...
v7.6
Knocknoc 7.6 Knocknoc 7.6 continues the theme of user-experience improvements, this time for end...
Allowlist (EDLs)
The Allowlist backend makes a list of active IP address grants available via the Knocknoc server ...
LOOTOTL - Last One Out Turn Off The Lights
Knocknoc keeps a track of source IP addresses and tries to be kind to users that share IPs. Think...
v25.12
Knocknoc 25.12 Knocknoc 25.12 is a Windows-first release focused on making Just-In-Time (JIT) ac...
Knocknoc client (scriptable login)
To gain access to underlying networks and systems, end-users log in to Knocknoc interactively vi...
Agent as a Reverse Proxy
The orchestration agent can be configured to reverse-proxy traffic, simply by enabling this mode ...
v7.0
Announcing Knocknoc 7.0 We’re excited to introduce Knocknoc 7.0, a landmark release packed wit...
Knocker - a cli helper
The Knocker utility is a command-line tool for managing various backends or server features with ...
IPSet (Linux Netfilter/IPTables)
Linux comes equipped with a built-in native firewall which Knocknoc orchestrates via "IPSets". IP...
Break Glass
Default deny is a wonderful thing, the best place to be - except when you lock yourself out. Than...
Manual Access
Default deny is the best way to live. However sometimes you need to manually grant access for a n...
Windows Firewall
Microsoft Windows comes equipped with a built-in native firewall which Knocknoc orchestrates to p...
Updates and upgrades
The Knocknoc software is managed by your operating system, as such updates can be managed within ...
SAML with EntraID (Azure AD)
The following example assumes your Knocknoc instance is located at https://<hosting instance>.kno...
AWS (EC2) Security Groups
Knocknoc can orchestrate Amazon AWS Security Groups, which essentially provide network level fire...
Moving from SQLite to PostgreSQL
If you installed Knocknoc Server before version 8.5 (September 2025), your instance is likely usi...
Create users
User creation varies depending on the authentication source in use. "SAML users" are created on-t...
Windows Servers
Windows Servers and RDP/WinRM - removing pre-auth attack surface A mid-sized business utilizes R...
Use cases (overview)
Knocknoc use cases Knocknoc is extremely versatile and can enable just in time network access co...