Secure Mobile Access 12.4 Administration Guide

User Access Agents

User access agents are deployed to client devices based on the community to which the user belongs. Most agents are deployed automatically when the user logs in to the WorkPlace portal using a browser. The installation package for these two access agents can also be made available for download from a file share on your network or deployed through applications such as Microsoft’s Systems Management Server (SMS) or IBM’s Tivoli. For more information, see Selecting Tunnel Access Methods for a Community.

When deployed automatically—when a user logs in using a browser—the access agents are both deployed and activated on the first visit. This generally requires the user to accept a download for the Secure Endpoint Manager (SEM), which will in turn manage the access agent installation and future access agent updates. On subsequent visits to the WorkPlace portal from the same client device using the same browser, the access agents are automatically activated without user intervention. See Client and Agent Provisioning (Windows) for more information.

The below table compares the capabilities of access agents and lists their requirements. For other system requirements, see Client Components.

Access agent comparison
Network tunnel access (IP protocol) Proxy access (TCP protocol) Web access (HTTP protocol)
OnDemand Tunnel agent Connect Tunnel client OnDemand Mapped Mode Translated, Custom Port mapped, Custom FQDN mapped Web access
Application support
TCP-based client/server applications x x x
TCP- or UDP-based client/server applications x x
URLs and Web applications x x x x
Windows networking
Web-based file access x x
Native Windows file access (Network Neighborhood) x x
Mapped network drives x x
Windows domain logon x
Connection types
Forward connections x x x x
Reverse connections (such as FTP or SMS) x x
Cross-connections (such as VoIP) x x
Operating systems
Windows x x x x
Linux x x
MacOS x x x x
Administrator privileges required to install client/agent x x
Deployment
Auto-activated from WorkPlace x x x
Provisioned from WorkPlace x x 1
Provisioned outside of WorkPlace x
  1. Port-mapped mode requires ActiveX or Java. For a user without administrator rights who can’t run ActiveX, the Java Runtime Environment (JRE) is used.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden