docs/documentation/platform/pam/getting-started/resources/windows-server.mdx
Infisical PAM supports secure, just-in-time access to Windows servers via the Remote Desktop Protocol (RDP). This allows your team to access Windows servers without sharing long-lived credentials, while maintaining a complete audit trail of who accessed what and when.
Windows Server access in Infisical PAM uses an Infisical Gateway to securely proxy RDP connections to your Windows server. When a user requests access, Infisical establishes a secure tunnel through the Gateway, enabling access without exposing your server directly.
sequenceDiagram
participant User
participant CLI as Infisical CLI
participant Infisical
participant Gateway as Infisical Gateway
participant Windows as Windows Server
User->>CLI: Request Windows Server access
CLI->>Infisical: Authenticate & request session
Infisical-->>CLI: Session credentials & Gateway info
CLI->>Gateway: Establish secure tunnel
Gateway->>Windows: RDP connection (port 3389)
Windows-->>Gateway: Session established
Gateway-->>CLI: Proxied RDP session
CLI-->>User: RDP access
Gateway: An Infisical Gateway deployed in your network that can reach the Windows server. The Gateway handles secure communication between users and your server.
RDP Protocol: Infisical connects to your Windows server using the Remote Desktop Protocol (RDP) on the configured port (default: 3389).
Account Types: Windows accounts can be categorized as either User accounts or Service accounts, allowing you to organize and manage different types of access.
Before configuring Windows Server access in Infisical PAM, you need:
The PAM Resource represents the Windows server you want to manage access to.
<Steps> <Step title="Ensure Gateway is Running"> Before creating the resource, ensure you have an Infisical Gateway running and registered with your Infisical instance. The Gateway must have network access to your Windows server. </Step> <Step title="Create the Resource in Infisical"> 1. Navigate to your PAM project and go to the **Resources** tab 2. Click **Add Resource** and select **Windows Server** 3. Fill in the connection details:<ParamField path="Name" type="string" required>
A friendly name for this resource (e.g., `production-windows`, `dev-server`)
</ParamField>
<ParamField path="Gateway" type="string" required>
Select the Gateway that has network access to this Windows server
</ParamField>
<ParamField path="Hostname" type="string" required>
The hostname or IP address of the Windows server (e.g., `192.168.1.100` or `server.internal.example.com`)
</ParamField>
<ParamField path="Port" type="number" required>
The RDP port (default: `3389`)
</ParamField>
<ParamField path="Active Directory Domain" type="string">
Optionally select an [Active Directory](/documentation/platform/pam/getting-started/resources/active-directory) resource to associate this Windows server with an AD domain. See [Domain Join](#domain-join) below for more details.
</ParamField>
Clicking **Create Resource** will trigger a connection test from the selected Gateway to your Windows server. Infisical verifies that the server is reachable and responds to RDP connection requests.
A PAM Account represents a specific Windows user account on the server. You can create multiple accounts per resource with different permission levels.
<Steps> <Step title="Navigate to the Resource"> After creating the resource, click into it to open the resource detail view. Select the **Accounts** tab on the right. </Step> <Step title="Add Account"> Click **Add Account**. </Step> <Step title="Fill in Account Details"> Fill in the account details:<ParamField path="Name" type="string" required>
A friendly name for this account (e.g., `admin-account`, `deploy-user`)
</ParamField>
<ParamField path="Account Type" type="string" required>
Select the type of Windows account:
- **User Account** - A standard Windows user account
- **Service Account** - A Windows service account
</ParamField>
<ParamField path="Username" type="string" required>
The Windows username on the server
</ParamField>
<ParamField path="Password" type="string" required>
The Windows password for this user
</ParamField>
Windows Server resources can be associated with an Active Directory resource to represent domain membership. This is useful for organizing your infrastructure and understanding which servers belong to which AD domain.
When creating or editing a Windows Server resource, select an AD domain from the Active Directory Domain dropdown. Once associated:
New-NetFirewallRule -DisplayName "Allow AD Subnet" -Direction Inbound -RemoteAddress 10.0.0.0/24 -Action Allow
Replace 10.0.0.0/24 with your actual internal subnet.
</Note>