defguard
  • Introduction
  • User documentation (help)
    • Configuring VPN
      • Defguard Desktop Client
        • Update instance
      • Other WireGuard® Clients
        • Configuring a device for new VPN Location manually
    • Password change / Reset
    • Enrollment & Onboarding
      • With internal Defguard SSO
      • With external SSO (Google/Microsoft/Custom)
    • Setting up 2FA/MFA
    • Desktop Client
    • CLI Client
  • Admin & features
    • Deploying your instance
      • One-line install script
      • Standalone package based installation
      • Docker images and tags
      • Docker Compose
      • Kubernetes
      • Upgrading
      • Gateway
        • Running gateway on MikroTik routers
      • Securing gRPC communication
      • OpenID RSA key
      • Configuration
      • Pre-production and development releases
      • High Availability and Failover
      • Health check
    • Features & configuration
      • Zero-Trust VPN with 2FA/MFA
        • Create/manage VPN Location
        • Network overview
        • Executing custom gateway commands
        • Multi-Factor Authentication (MFA/2FA)
          • MFA Architecture
        • Remote desktop client configuration
        • DNS and domains
      • Remote user enrollment
        • User onboarding after enrollment
      • SSO (OpenID Connect)
        • Portainer
        • Grafana setup
        • Proxmox
        • Matrix / Synapse
        • Django
        • MinIO
        • Vault
      • SMTP for email notifications
      • YubiKey Provisioning
      • Webhooks
      • Forward auth
      • SSH Authentication
      • Network devices
      • Gateway notifications
      • New version notifications
  • Troubleshooting Guide
    • Sending support information
    • Client Windows installer exit codes
    • Client "All traffic" connection issues
    • WebAuthn security keys
  • Enterprise Features
    • License
    • Enteprise features
      • Automatic (real time) desktop client configuration & sync
      • External OpenID providers
        • Google
        • Microsoft
        • Zitadel
        • Keycloak
        • JumpCloud
        • Okta
        • Custom
      • External OIDC secure enrollment
      • VPN & Client behavior customization
      • REST API
      • Access Control List
        • ACL Aliases
      • LDAP and Active Directory integration
        • Configuration
        • Settings table
        • Two-way LDAP and Active Directory synchronization
  • Tutorials
    • Step by step setting up a VPN server
      • Adding additional VPN locations
  • In depth
    • Roadmap
    • Architecture
      • How do VPN statistics work
      • Security concepts
  • For Developers
    • Contributing
    • Environment setup
    • Translations (core/web)
      • Switching language
      • Adding translations
  • Translations (client)
    • Adding translations
  • Contact us
    • Community & Support
Powered by GitBook
On this page
  • Enrollment using desktop client
  • Web/browser based enrollment
  • User onboarding after enrollment

Was this helpful?

Edit on GitHub
  1. User documentation (help)
  2. Enrollment & Onboarding

With internal Defguard SSO

PreviousEnrollment & OnboardingNextWith external SSO (Google/Microsoft/Custom)

Last updated 6 months ago

Was this helpful?

Defguard provides secure remote enrollment process (remote registration and account activation), during which the user can:

  • double-check their data

  • setup their password

  • add their initial device to access VPN as a nice wizard!

  • see admin (that has added this user) contact details

This process includes account setup and/or VPN configuration since defguard is used as an SSO for:

  • accessing all your applications, meaning with defguard's account you not only access/configure VPN but also log in to other applications.

  • and accessing the VPN.

All done by a nice wizard:

This can be done in two ways - either in the browser (web based) or by using a defguard desktop client. For both ways, there is an email that is sent to the user with explanation and relevant URLs/tokens.

When starting the enrollment process - a user will have only 10minutes to complete the process.

The enrollment token is valid for 24 hours.

Enrollment using desktop client

In the desktop client when adding an instance - the enrollment & onboarding process takes place.

What is great about this is that after the enrollment process is done - the desktop client is automatically configured with all available VPN locations for the user.

Web/browser based enrollment

When accessing the enrollment service in the browser the process is extended with the possibility to configure the initial VPN device/access manually.

User onboarding after enrollment

After the enrollment proces new users are provided with any relevant company information, links to company systems, security guidelines, etc.

The onboarding messages will be shown on the last step of the enrollment process and sent to the user via email:

Even if the user will do enrollment in the browser - the desktop client can be configured later by using:

Onboarding process
Remote desktop client activation.