Advanced Search
Search Results
119 total results found
Licensing Knocknoc
Knocknoc licensing and pricing can be found on the Knocknoc website. Once you have obtained your license and have either completed the self-hosted install or received the login details for your cloud hosted instance: Copy your license key from the Knocknoc...
Mikrotik RouterOS
The scripting backend can be used for MikroTik RouterOS config updates as well. Here is a sample script you can use as a backend: #!/bin/bash # MikroTik SSH Update Script # Configuration MIKROTIK_USER="admin" MIKROTIK_HOST="192.168.88.1" # Replace with...
Create groups
Groups in Knocknoc map users to Knocs. Users can be assigned to multiple groups, to create a group in Knocknoc; Browse to the Knocknoc admin interface. Click on Groups on the left. Click Create Group on the right. Enter the name of the Group. If the Gr...
Click to grant/revoke
For additional security and temporal access control, Knoc's support a "click to grant" and "click to revoke" option. This requires the user to click a button after logging in, prior to each grant being processed. This offers an additional layer of security an...
Admins
Admins in Knocknoc can login to /admin on their Knocknoc server, however they can't be granted ACLs. This separates out regular logins from admin logins, and allowed for best practice. You can create an Admin using this dialog box if required. SAML is the p...
Settings
The Settings in Knocknoc allows you to configure some of the basic setup like authentication sources in a web interface. This is also where the license is applied, along with SAML configuration and more. The License is where you can cut and paste your licen...
Time for NTP
NTP It's important that ALL the servers within the Knocknoc cluster and agents are synchronised and set to the correct time. We recommend using chrony on a Linux VM to keep the time, but any NTP implementation would work. Time is an important aspect of auth...
LDAP troubleshooting tips
The Knocknoc server will need to be able to contact your LDAP server on port 389 or 636. This is determined by the LDAP URL in the Settings: ldap://myldap.domain.com - this format says port 389 ldaps://myldap.domain.com - this format is port 636 Please make...
Knocknoc server behind HAProxy
Running Knocknoc behind HAProxy could be a great option for people with existing HAProxy deployments, or who want to unify certificate and other management tasks. Here is a sample HAProxy config for Knocknoc as a backend: frontend Sol1-Frontend bind 0.0.0...
Getting Started
Cloud SaaS or self-hosted server? You can run your Knocknoc server either as a managed cloud instance (we host it) or self-host it. Should you deploy a cloud or self-hosted instance of Knocknoc? The answer will depend on a few factors. For example, if you w...
IPsets with Shorewall
This is an example that lets you use Shorewall https://shorewall.org/index.html and IPsets to dynamically allowlist IPs. You can achieve great power with these simple steps: Install the Knocknoc Agent on the Shorewall host and enrol it into the Knocknoc se...
HAProxy tips and tricks
Checking to see if an ACL is present in HAProxy For when you aren't sure if the whole process is working, you can manually connect to the HAProxy socket and print out the contents. socat is the way forward here. Install it with your favourite package manager...
Create users
User creation varies depending on the authentication source in use. "SAML users" are created on-the-fly from your IdP in to Knocknoc once SAML is established, "local" users will need to be created within the admin interface and LDAP users will need to be confi...
SAML for the Admin Interface
SAML for the admin interface is the same as SAML for the user base with a few very small alterations. Follow the existing guides for EntraID, OKTA or JumpCloud etc, while keeping the below in mind. If the same IdP is in use for users and admins, a second Ap...
Nginx
Nginx support via script was added in knocknoc-agent version 1.0.30. This allows for flexible ACL management from Knocknoc server for nginx. Setup for the Nginx server To get started, make sure you have knocknoc-agent version 1.0.30 or above installed. The ...
Apache Webserver
Apache 2.4 and above have slightly different ACL syntax, so this page covers how you can use Knocknoc to manage ACLs. The script for managing Apache ACLs as per this document was added to knocknoc-agent in version 1.0.31 Setup for your Apache webserver SSH t...
SAML with Gsuite as IDP
Gsuite can be setup as an Identity Provider if you have Gsuite Business Startter or above plan. The basis of this guide is the official docs here: https://support.google.com/a/answer/6087519?hl=en which should be referred to in case any thing changes from the...
Fortigate Address Groups (Fortinet)
The FortiOS integration allows Knocknoc to dynamically add and remove user's source IP from a named address group. This address group can then be used in whatever Firewall rule you like, opening up many possibilities for securing access to systems behind Fort...