Back to Infisical

Windows Server

docs/documentation/platform/pam/getting-started/resources/windows-server.mdx

0.159.256.2 KB
Original Source

Infisical PAM supports secure, just-in-time access to Windows servers via the Remote Desktop Protocol (RDP). This allows your team to access Windows servers without sharing long-lived credentials, while maintaining a complete audit trail of who accessed what and when.

How It Works

Windows Server access in Infisical PAM uses an Infisical Gateway to securely proxy RDP connections to your Windows server. When a user requests access, Infisical establishes a secure tunnel through the Gateway, enabling access without exposing your server directly.

mermaid
sequenceDiagram
    participant User
    participant CLI as Infisical CLI
    participant Infisical
    participant Gateway as Infisical Gateway
    participant Windows as Windows Server

    User->>CLI: Request Windows Server access
    CLI->>Infisical: Authenticate & request session
    Infisical-->>CLI: Session credentials & Gateway info
    CLI->>Gateway: Establish secure tunnel
    Gateway->>Windows: RDP connection (port 3389)
    Windows-->>Gateway: Session established
    Gateway-->>CLI: Proxied RDP session
    CLI-->>User: RDP access

Key Concepts

  1. Gateway: An Infisical Gateway deployed in your network that can reach the Windows server. The Gateway handles secure communication between users and your server.

  2. RDP Protocol: Infisical connects to your Windows server using the Remote Desktop Protocol (RDP) on the configured port (default: 3389).

  3. Account Types: Windows accounts can be categorized as either User accounts or Service accounts, allowing you to organize and manage different types of access.

Prerequisites

Before configuring Windows Server access in Infisical PAM, you need:

  1. Infisical Gateway - A Gateway deployed in your network with access to the Windows server
  2. RDP Enabled - Remote Desktop must be enabled on the Windows server (port 3389 by default)
  3. Windows Credentials - A username and password for a Windows account on the server
<Warning> **Gateway Required**: Windows Server access requires an Infisical Gateway to be deployed and registered with your Infisical instance. The Gateway must have network connectivity to your Windows server on the RDP port (default: 3389). </Warning>

Create the PAM Resource

The PAM Resource represents the Windows server you want to manage access to.

<Steps> <Step title="Ensure Gateway is Running"> Before creating the resource, ensure you have an Infisical Gateway running and registered with your Infisical instance. The Gateway must have network access to your Windows server. </Step> <Step title="Create the Resource in Infisical"> 1. Navigate to your PAM project and go to the **Resources** tab 2. Click **Add Resource** and select **Windows Server** 3. Fill in the connection details:
<ParamField path="Name" type="string" required>
  A friendly name for this resource (e.g., `production-windows`, `dev-server`)
</ParamField>

<ParamField path="Gateway" type="string" required>
  Select the Gateway that has network access to this Windows server
</ParamField>

<ParamField path="Hostname" type="string" required>
  The hostname or IP address of the Windows server (e.g., `192.168.1.100` or `server.internal.example.com`)
</ParamField>

<ParamField path="Port" type="number" required>
  The RDP port (default: `3389`)
</ParamField>

<ParamField path="Active Directory Domain" type="string">
  Optionally select an [Active Directory](/documentation/platform/pam/getting-started/resources/active-directory) resource to associate this Windows server with an AD domain. See [Domain Join](#domain-join) below for more details.
</ParamField>

Clicking **Create Resource** will trigger a connection test from the selected Gateway to your Windows server. Infisical verifies that the server is reachable and responds to RDP connection requests.
</Step> </Steps>

Create PAM Accounts

A PAM Account represents a specific Windows user account on the server. You can create multiple accounts per resource with different permission levels.

<Steps> <Step title="Navigate to the Resource"> After creating the resource, click into it to open the resource detail view. Select the **Accounts** tab on the right. </Step> <Step title="Add Account"> Click **Add Account**. </Step> <Step title="Fill in Account Details"> Fill in the account details:
<ParamField path="Name" type="string" required>
  A friendly name for this account (e.g., `admin-account`, `deploy-user`)
</ParamField>

<ParamField path="Account Type" type="string" required>
  Select the type of Windows account:
  - **User Account** - A standard Windows user account
  - **Service Account** - A Windows service account
</ParamField>

<ParamField path="Username" type="string" required>
  The Windows username on the server
</ParamField>

<ParamField path="Password" type="string" required>
  The Windows password for this user
</ParamField>
</Step> </Steps>

Domain Join

Windows Server resources can be associated with an Active Directory resource to represent domain membership. This is useful for organizing your infrastructure and understanding which servers belong to which AD domain.

When creating or editing a Windows Server resource, select an AD domain from the Active Directory Domain dropdown. Once associated:

  • The Windows server's connection details page will display the linked AD domain.
  • The AD resource's Related Resources tab will list this Windows server as a domain member.
  • AD account Resources tabs will show all domain-joined Windows servers, providing a centralized view of machines accessible with those domain credentials.
<Note> Depending on your environment, you may need to allow inbound traffic from your internal network on the Windows server's host firewall, in addition to any infrastructure-level firewall rules. For example, in PowerShell on the Windows server:
powershell
New-NetFirewallRule -DisplayName "Allow AD Subnet" -Direction Inbound -RemoteAddress 10.0.0.0/24 -Action Allow

Replace 10.0.0.0/24 with your actual internal subnet. </Note>