TRASA is a Zero Trust Service Access Platform.
1- Is a layer 7 protocol, user identity, and privilege aware access proxy.
2- Can enforce security policies (time, file transfers, location, context, 2fa) to SSH, RDP, Web, Database access.
3- Can enforce access policy based on the security hygiene of user devices.
4- Add a two-factor authentication agent (native integration) to protect access to SSH, RDP, Database, and Hardware appliance.
If you have used the Bastian server to jump access or centralized access to internal infrastructure, you can also think of TRASA as a Bastian server on steroids!
After you create a TRASA One-Click VM, log in to it with your configured SSH key and follow the initial setup instructions:
$ Enter TRASA server domain/IP:Enter the domain name or IP address in which TRASA server will listen
$ Do you want to retrieve certificate from Let's Encrypt? (Y/N)TRASA can fetch a lets encrypt certificate for you. If you have supplied a private domain or IP address in the step before, enter
Nhere. Otherwise, enter
Once you are done with the above step, you can access TRASA dashboard on the domain or IP you provided in Step 1. Follow this guide for the initial account setup process: https://www.trasa.io/docs/install/initial-setup .
Note: If you want to protect RDP access using TRASA, you will need to install Apache Guacamole Server daemon (Guacd). Follow this guide for installation reference: https://www.trasa.io/docs/install/installation .