Advanced Search
Search Results
146 total results found
SAML with Jumpcloud
The following example assumes your Knocknoc instance is located at https://demo.knoc.cloud. Wherever you see that, please substitute it for your own instance URL. Setting Up the IdP Creating An Application Login to your JumpCloud tenant as an administrator. ...
SAML with EntraID (Azure AD)
The following example assumes your Knocknoc instance is located at https://<hosting instance>.knoc.cloud. Wherever you see that, please substitute it for your own instance URL (e.g. https://demo.knoc.cloud, https://my-saas.knoc.cloud). Setting Up the IdP Crea...
SAML with OKTA
The following example assumes your Knocknoc instance is located at https://demo.knoc.cloud. Wherever you see that, please substitute it for your own instance URL. Setting Up the IdP Create an Application Click Create App Integration Select SAML 2.0 Set an App...
Local Authentication (MFA included)
Knocknoc supports local users in addition to SAML/LDAP. Simply add a user, with a username and password. Then assign them to a group or link them within a Knoc. This is helpful for casual users, as you can set an expiry. So for example if you have a web applic...
v5.0
Current version of Knocknoc server is: 5.0.62, released on Mon, 12 Feb 2024 Current version of knocknoc-agent is: 1.0.28, released on Sat, 24 Feb 2024
IPsets with UFW
This is an example that lets you use UFW (https://wiki.ubuntu.com/UncomplicatedFirewall) and IPsets to dynamically allowlist IPs for a common host-based firewall. This is achieved in only a few steps: Install the Knocknoc orchestration agent on the UFW host ...
Licensing Knocknoc
Knocknoc licensing and pricing can be found on the Knocknoc website. Once you have obtained your license and have either completed the self-hosted install or received the login details for your cloud hosted instance: Copy your license key from the Knocknoc Li...
Mikrotik RouterOS
The scripting backend can be used for MikroTik RouterOS config updates as well. Here is a sample script you can use as a backend: #!/bin/bash # MikroTik SSH Update Script # Configuration MIKROTIK_USER="admin" MIKROTIK_HOST="192.168.88.1" # Replace with your ...
Create groups
Groups in Knocknoc map users to Knocs. Users can be assigned to multiple groups, to create a group in Knocknoc; Browse to the Knocknoc admin interface. Click on Groups on the left. Click Create Group on the right. Enter the name of the Group. If the Gr...
Click to grant/revoke
For additional security and temporal access control, Knocs support a "click to grant" and "click to revoke" option. This requires the user to click a button after logging in, prior to each grant being processed. This offers an additional layer of security and ...
Admins
Admins in Knocknoc can login to /admin on their Knocknoc server, however they can't be granted ACLs. This separates out regular logins from admin logins, and allows for best practice. You can create an Admin using this dialog box if required. SAML is the pref...
Settings
The Settings in Knocknoc allows you to configure some of the basic setup like authentication sources in a web interface. This is also where the license is applied, along with SAML configuration and more. The License is where you can cut and paste your license...
Time for NTP
NTP It's important that ALL the servers within the Knocknoc cluster and agents are synchronised and set to the correct time. We recommend using chrony on a Linux VM to keep the time, but any NTP implementation would work. Time is an important aspect of auth...
LDAP troubleshooting tips
The Knocknoc server will need to be able to contact your LDAP server on port 389 or 636. This is determined by the LDAP URL in the Settings: ldap://myldap.domain.com - this format says port 389 ldaps://myldap.domain.com - this format is port 636 Please make...
Knocknoc server behind HAProxy
Running Knocknoc behind HAProxy could be a great option for people with existing HAProxy deployments, or who want to unify certificate and other management tasks. Here is a sample HAProxy config for Knocknoc as a backend: frontend Sol1-Frontend bind 0.0.0...
Getting Started
Cloud SaaS or self-hosted server? You can run your Knocknoc server either as a managed cloud instance (we host it) or you can self-host it. Should I deploy a cloud or self-hosted instance of Knocknoc? The answer will depend on a few factors. For example, if yo...
IPsets with Shorewall
This is an example that lets you use Shorewall https://shorewall.org/index.html and IPsets to dynamically allowlist IPs. You can achieve great power with these simple steps: Install the Knocknoc Agent on the Shorewall host and enrol it into the Knocknoc serve...
HAProxy tips and tricks
Checking to see if an ACL is present in HAProxy For when you aren't sure if the whole process is working, you can manually connect to the HAProxy socket and print out the contents. socat is the way forward here. Install it with your favourite package manager...