Server Name Resolution
Advanced Server Access implements a custom name resolution system, which is used to resolve user-supplied names to a server registered with Advanced Server Access.
For example, if you run
sft ssh web0, the name
web0 will be resolved in Advanced Server Access. Likewise, if the agentA software agent is a lightweight program that runs as a service outside of Okta. It is typically installed behind a firewall and allows Okta to tunnel communication between an on-premises service and Okta's cloud service. Okta employs several agent types: Active Directory, LDAP, RADIUS, RSA, Active Directory Password Sync, and IWA. For example, users can install multiple Active Directory agents to ensure that the integration is robust and highly available across geographic locations. on
web0 has a config file specifying
bastion.example.com will be resolved in order to establish a tunnel to
If Advanced Server Access is unable to resolve a name to an enrolled server, Advanced Server Access will fall back to using locally supported name resolution and authentication methods to access the server. For example, if you run
sft ssh web0.example.com and Advanced Server Access is unable to resolve that name to a server enrolled in Advanced Server Access, the clientEssentially, a client is anything that talks to the Okta service. Within the traditional client-server model, Okta is the server. The client might be an agent, an Okta mobile app, or a browser plugin. will behave as though you had run
ssh web0.example.com without using Advanced Server Access at all.
Advanced Server Access only matches names against active servers. A server is considered active if all of the following conditions are true:
- The server was enrolled in Advanced Server Access
- The server was not subsequently deleted from Advanced Server Access
- The Advanced Server Access agent was recently running on the server, and able to contact the Advanced Server Access platform. Currently the threshold is 96 hours (4 days), but this is subject to change.
As a special case, if an Unmanaged Server is created in Advanced Server Access it will be considered active until it is deleted.
When resolving a name, Advanced Server Access will look for any server matching one of the following values.
id, a random UUID automatically assigned by the Advanced Server Access platform during enrollment.
hostname, as reported by the operating system on the server. If the OS hostname ends in ".local" this will be ignored by the platform. For example, if the OS hostname is "web0.local", you will be able to access the server as "web0", but not as "web0.local".
CanonicalName value is specified in the Advanced Server Access agent config, this value will be used in place of the OS hostname.
AltNames values specified in the Advanced Server Access agent config file on the server. AltNames can be used to add additional aliases to servers.
Default IP Address
The default IP address of the server, as determined by Advanced Server Access.
If the server is an AWS or GCE cloud instance, the provider-assigned ID of the instance.
If a name supplied to the Advanced Server Access client resolves to more than one server the client will return an error in order to avoid inadvertently connecting to an unintended server.
One side effect of this is that if a server is replaced with a new server bearing the same hostname, or if the agent is forced to re-enroll, a user with administrative privileges will need to manually delete the original server record before the new one can be addressed by the shared name. Alternatively, usersIn Okta literature, we generally refer to "users" as the people who serve as Okta administrators. When we refer to "end users" we are generally referring to the people who the administrators serve. That is, those who use Okta chiclets to access their apps, but have no administrative control. can specify an unambiguous name such as the server ID, or wait for the original server record to become inactive.
Bastion name supplied in a Advanced Server Access agent configuration is ambiguous, the Advanced Server Access platform will attempt to choose the best fit by ranking matches in descending order of preference by matching:
- Cloud Instance ID
- Default IP Address
Ties are broken arbitrarily.
Once a server has been resolved, Advanced Server Access will attempt to determine the IP address that should be used to address it.
If the server is being accessed directly by the Advanced Server Access client, the client will attempt to use the server's Default IP Address as described below.
If the server is being accessed via one or more bastions, and the immediately preceding bastion resides in the same AWS VPC or GCE Network as the server, Advanced Server Access will prefer the server's corresponding private IP address. Otherwise Advanced Server Access will use the Default IP Address.
Default IP Address
Each server enrolled in Advanced Server Access is assigned a Default IP Address, which will be the first available value from:
AccessAddressvalue specified in the Advanced Server Access agent configuration file
- An AWS instance's
public_ip_v4based on the instance metadata
- A GCE or Azure instance's external, or internal IP addresss, based on the instance's metadata
- The numerically lowest v4 IP address in a public address range
- The numerically lowest v4 IP address in a private range