Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

50 total results found

v7.6

Changelog and Roadmap

Knocknoc 7.6 Knocknoc 7.6 continues the theme of user-experience improvements, this time for end users. But don't be fooled, there's other goodies in here for you. Don't miss the Palo Alto enhancements - we now leverage the powerful Palo Alto User-ID feature y...

Microsoft Azure NSG

Admin Guide Knocs (backends)

Overview This integration allows for IP addresses to be dynamically managed within Azure Network Security Groups (NSGs), which are used by default as the inner firewalls protecting virtual machines. Other Azure assets (PaaS etc) are managed using separate Knoc...

SaaS deployment

Admin Guide Setup guides

To create a SaaS Server instance (we host it) log in to the licensing portal and follow the prompts. Go to licensing.knocknoc.io and : Start a cloud trial / subscription Create a Cloud Instance and give it a name (e.g. test-instance). Your instance will...

User authentication

Admin Guide Knocknoc API

User sessions can be created using the API. This is handy for machine to machine authentication, and is where knocknoc-client authentication requests are also configured. As an Admin, create a local user, selecting API Key as the authentication method: Visit ...

Manage user sessions

Admin Guide Knocknoc API

User sessions can be terminated using the API. This is handy for integration with revocation systems, SOAR/SIEM integrations whereby immediate termination of network access and sessions is desired. As an Admin, visit the API keys section and choose "Manage use...

Allowlist/EDL access

Admin Guide Knocknoc API

Allowlists or External Dynamic Lists (EDLs) served from Knocknoc require a secret for access, along with the specific EDL URI. These secrets are automatically created when a Passive integration is established, but can be edited or expanded. As an Admin, visit ...

Agent registration

Admin Guide Knocknoc API

API keys can be created to allow just-in-time orchestration Agent registration, which is suitable for infrastructure-as-code or pipeline deployments whereby the Admin doesn't want to create an Agent registration key prior to deployment and registration. As an ...

Grant duration

Admin Guide Access

Users are assigned a default "grant period" (in minutes), either within Knocknoc for local users, or passed as a SAML attribute through "sessionDuration".  These can be overridden per-Knoc, allowing certain access paths to have shorter periods if so desired. F...

v8.0

Changelog and Roadmap

Knocknoc 8.0 Knocknoc 8.0 delivers a powerful set of updates, enhancing validation on connecting clients beyond just source IP addresses through the introduction of Knocknoc Access Tokens for web transactions. Additionally, fine-grained per-Knoc session limits...

Knocknoc client (scriptable login)

Admin Guide Setup guides

To gain access to underlying networks and systems, end-users  log in to Knocknoc interactively via the Server component. This provides registered orchestration-Agents information to perform ongoing access provisioning. If you need to script access in a non-int...

HAProxy + KAT

Admin Guide Knocs (backends)

Sometimes IP address restrictions or IP-based allowlisting is not enough, think: airport lounge, CGNat or other large, untrusted NAT environments. That's why Knocknoc extends a reverse-proxy in an innovative way through the addition of Knocknoc Access Tokens. ...

FortiManager

Admin Guide Knocs (backends)

The FortiManager is used to manage multiple Fortinet devices, including Fortigate firewalls, APs, switches and more. Utilizing Knocknoc with FortiManager local-in access controls can be applied, limiting exposure to Admin login source addresses dynamically. Tr...

VPNs, internal addresses and access

Admin Guide Access

You may want to limit the ability to access a Knoc, depending on where your user is logging in to Knocknoc from.  For example, an internal subnet should only be opened up if the user is connecting from an internal IP address range, or if they are connected to...

v8.5

Changelog and Roadmap

Knocknoc 8.5   Knocknoc 8.5 delivers key improvements in usability, integrations, and security, while paving the way for future growth. Security is enhanced through updated server components, Golang and library upgrades, and additional hardening measures, incl...

Redirecting Users

Admin Guide Access

Knocknoc supports two ways to redirect the user to a specific site from the Knocknoc Dashboard. The first way is to redirect from a parameter in the URL used to access the Dashboard, the second is to have a user automatically redirect when logging in with a si...

Sophos (UTM)

Admin Guide Knocs (backends)

The Sophos UTM device provides firewall and UTM capabilities. Note that this series of devices is being EOL'd by Sophos in favor of the SFOS devices (June 2026), which can also be integrated with Knocknoc following this guide. UTM Configuration Firstly create...

Sophos (SFOS/XGS)

Admin Guide Knocs (backends)

The Sophos SFOS/XGS based devices provide advanced firewall and UTM capabilities. This replaces the previous UTM devices, which can be integrated here. Knocknoc manages IP addresses within a host-group, it does not edit/change firewall policies, and operates w...

Agent as a Reverse Proxy

Admin Guide Setup guides

The orchestration agent can be configured to reverse-proxy traffic, simply by enabling this mode and completing a few configuration options, you'll be on your way to controlling HTTPs or TCP attack surface, without an additional firewall or other layer beyond ...