Available as Infrastructure as a Code on AWS for fast deployment.
PrivX is a lean and modern privileged access management solution to automate your AWS, Azure and GCP infrastructure access management in one multi-cloud solution. While it offers super great cloud experience, you can also easily connect your on-prem infrastructure to it for a single pane of glass access control and monitoring. This project further simplifies PrivX on-boarding experience with deployment automation using infrastructure as a code tooling.
Having seen how permanent passwords and left-behind and forgotten SSH keys enable access to critical environments years after they were actually created and needed, we started the PrivX project in order to get rid of the passwords and keys – to get rid of any permanent access altogether. We wanted to build a solution that only grants access when it's needed & on the level needed. Later on this approached was coined Just-in-Time-Access and the method as Zero Standing Privileges (ZSP) by industry analysts while part of the larger Zero Trust trend of always (re-)verifying a user before any access is granted.
PrivX automates the process of granting and revoking access by integrating & fetching identities and roles from your identity management system (LDAP, AD etc) and ensures your engineering and admin staff have one-click access to the right infrastructure resources at the right access level. You will also get full audit trail and monitoring - vital if you are handling sensitive data or for example open access for third parties to your environment.
Learn more about PrivX and get your trial license.
To learn how PrivX works, please check out this video.
SSH experience
RDP experience
The latest version of Infrastructure as a Code is available at master
branch of the repository. All development, including new features and bug fixes, take place on the master
branch using forking and pull requests as described in contribution guidelines.
- We are using AWS CDK and TypeScript to code PrivX infrastructure components. You have to configure your environment with node and npm version 10.x or later and install required components.
## with brew on MacOS
brew install node
## then install CDK
npm install -g typescript ts-node aws-cdk
-
Obtain access to target AWS Account. You shall have ability to create/delete AWS resources.
-
Obtain
subdomain
,domain
name(s) and configure AWS Route53 HostedZone. If you have a fresh AWS Account or missing domain name, you can request one from AWS.
Use AWS CDK command line tools to deploy PrivX to your AWS Account. Please note, the process consists of multiple stages:
##
## 1. clone privx-on-aws repository locally
git clone https://github.com/SSHcom/privx-on-aws
cd privx-on-aws
##
## 2. pre-config deployment process by configure environment and
## installing dependent components
export AWS_ACCESS_KEY_ID=Your-Access-Key
export AWS_SECRET_ACCESS_KEY=Your-Secret-Key
export CDK_DEFAULT_ACCOUNT=Your-Account-Id
export CDK_DEFAULT_REGION=eu-west-1
export AWS_DEFAULT_REGION=eu-west-1
npm install
##
## 3. configure and bootstrap target AWS region with AWS CDK.
## Please note, the process requires domain name here.
## the corresponding hosted zone must be properly configured otherwise
## deployment fails.
cdk bootstrap aws://${CDK_DEFAULT_ACCOUNT}/${CDK_DEFAULT_REGION} \
-c domain=example.com
##
## 4. deploy PrivX, you need to define a few variables here
## subdomain unique name of your privx instance.
## DO NOT USE any non-alphabet characters including
## punctuation in the subdomain name
##
## cidr allocate unique class A network `cidr` block for AWS VPC
## default value 10.0.0.0/16 fits to majority of deployments
##
## email address to deliver CloudWatch alerts
##
## sshkey AWS SSH key pair to access PrivX instance for debugging
## purpose, keep empty to disable ssh access
## See more about ssh key from AWS documentation
## https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html
##
cdk deploy privx-on-aws \
-c cidr=10.0.0.0/16 \
-c subdomain=privx \
-c domain=example.com \
-c [email protected] \
-c sshkey=aws-keypair-name
In few minutes, your own instance of PrivX solution is available. Please check our playbook or raise GitHub issue if you have any troubles with deployment process. The deployment build entire PrivX architecture in your AWS account.
Open a Web browser with your fully qualified domain name, e.g. https://privx.example.com
.
The login credentials for superuser
is available in your AWS Account:
- Choose right region
- Goto AWS Secrets Manager > Secrets > KeyVault...
- Scroll to Secret value section
- Click Retrieve secret value
In the final step, please obtain a license code to activate your environment.
- Getting Started with PrivX
- Learn more about PrivX Users and Permissions
- Check Online Administrator Manual
- Read our playbook for advanced deployment and configuration use-cases.
If you experience any issues with the library, please let us know via GitHub issues. We appreciate detailed and accurate reports that help us to identity and replicate the issue.
-
Specify the configuration of your environment. Include which operating system you use and the versions of runtime environments.
-
Attach logs, screenshots and exceptions, in possible.
-
Reveal the steps you took to reproduce the problem, include code snippet or links to your project.
The project is Apache 2.0 licensed and accepts contributions via GitHub pull requests:
- Fork it
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Added some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create new Pull Request
The development requires TypeScript and AWS CDK
npm install -g typescript ts-node aws-cdk
git clone https://github.com/SSHcom/privx-on-aws
cd privx-on-aws
npm install
npm run build
npm run test
npm run lint