Privileged Access Jumpoint Guide: Unattended Access to Computers in a Network
With Bomgar Jump Technology, a user can access and control remote, unattended computers in any network. Jump Technology is integral to the Bomgar software offerings.
A Jumpoint acts as a conduit for unattended access to Windows computers on a known remote network. A single Jumpoint installed on a computer within a local area network is used to access multiple systems, eliminating the need to pre-install software on every computer you may need to access.
Within the local area network, the Bomgar user's computer can initiate a session to a Windows system directly without using a Jumpoint, if appropriate user permissions are enabled. A Jumpoint is needed only when the Bomgar user's computer cannot access the target computer directly.
Note: If you would like to learn about Jump Items for mobile devices, view Use Jump Items to Access Endpoints from the Android Access Console for Android devices and Use Jump Items to Access Endpoints from the iOS Access Console for iOS devices.
Topics Covered in the Jumpoint Guide
- Recommended Steps to Implement Jump Technology
- Use Jump Item Roles to Configure Permission Sets for Jump Items
- Create Jump Policies to Control Access to Jump Items
- Use Jump Groups to Configure Which Users Can Access Which Jump Items
- Requirements and Considerations to Install a PA Jumpoint
- Configure and Install a PA Jumpoint
- Use a Jump Shortcut to Jump to a Remote System
- Local Jump Shortcuts
- Remote Jump Shortcuts
- Remote Desktop Protocol Shortcuts
- VNC Shortcuts
- Protocol Tunnel Jump Shortcuts
- Shell Jump Shortcuts
- Use Web Jump to Access Web Services
- Use Cases for Implementing Jump Items
- Appendix: Require a Ticket ID Workflow for Jump Item Access
- Appendix: PA Jumpoint Error Message