Skip to main content

Protocols

Supported Protocol Types

Different connection protocols are categorically organized in the Keycyte PAM user interface. Each protocol type is visually differentiated with its own icon to optimize user experience.

RDP (Remote Desktop Protocol)

This is the standard remote desktop connection protocol for Windows-based servers. Under the RDP category, Windows Server systems, Windows 10/11 workstation machines, and terminal services are listed. Through this protocol, full graphical interface access is provided, allowing you to work on the target system as if you were on a local computer.

VNC (Virtual Network Computing)

This is a platform-independent graphical desktop sharing protocol. It is used for remote management of Linux, Unix, and other systems with graphical interfaces. The VNC protocol is preferred in situations where network conditions are limited due to its ability to work even with low bandwidth.

SSH (Secure Shell)

This is a secure terminal access protocol for Linux, Unix, and network devices. Under the SSH category, Linux servers, network switches, routers, and other command-line based systems are included. Through this protocol, both interactive shell access and secure file transfer operations can be performed.

Telnet (Terminal Network Protocol)

This is a terminal access protocol for legacy systems and old network devices. While modern security standards recommend SSH usage, some old hardware and special systems are still managed through the Telnet protocol. Keycyte PAM performs these connections through secure tunnels, minimizing Telnet's inherent security vulnerabilities and routing all session traffic through encrypted channels.

APP (Application Launcher)

This is a protocol designed for launching all Windows applications with .exe extensions individually. Database connections can be established under this protocol. Username and password fields are automatically filled for database access, and users can perform their logins without needing to know the passwords for these connections.

WEBAPP (Web Application Access)

This is the protocol used for secure access to web-based applications. Under this category, management panels with web interfaces, cloud services, and other HTTP/HTTPS-based applications are listed. Keycyte PAM's robot running on Chrome automatically fills in the username and password in web applications, clicks the login button, and users can access the web application without seeing the password information.

MySQL (MySQL Database Access)

This is a dedicated access protocol for MySQL database servers. Through this protocol, MySQL Workbench, phpMyAdmin, or similar MySQL client applications are automatically launched with pre-configured connection parameters. Users can directly run SQL queries and perform database management operations without knowing database passwords.

MsSQL (Microsoft SQL Server Access)

This is a protocol designed for secure access to Microsoft SQL Server databases. SQL Server Management Studio (SSMS) or other MSSQL client tools are launched with automatic credential injection. Both Windows Authentication and SQL Server Authentication modes are supported, and users can access enterprise database systems without having to remember complex database passwords.

PostgreSQL (PostgreSQL Database Access)

This is a specialized access protocol for PostgreSQL database systems. PostgreSQL tools such as pgAdmin, DBeaver, or command-line psql client are launched with pre-injected credentials. Through this protocol, both interactive SQL queries and database management operations can be performed securely, and all database activities are tracked in audit logs by the PAM system.

3rd Party Services (Third-Party Services)

This is a flexible protocol category designed for custom-developed applications, vendor-specific management tools, and enterprise software solutions. Through this protocol, access to ERP systems, CRM applications, monitoring tools, and other business-critical applications is provided with Single Sign-On (SSO) support. Customized launcher scripts and credential injection mechanisms can be configured for each third-party service, enabling seamless integration with the organization's existing IT infrastructure.