Quick start
  • 5 Minutes to read
  • Dark
    Light
  • PDF

Quick start

  • Dark
    Light
  • PDF

Article summary


Welcome to Splashtop Secure Workspace. This guide will walk you through the main steps required to set up your Secure Workspace environment, allowing you to connect to private network applications from your devices.

Prerequisites

Before getting started, make sure you have the following:

  • A Splashtop Secure Workspace admin account with either the super admin role or organization admin role.
  • A computer connected to a network that can establish outbound HTTPS (port 443) connections to the Secure Workspace Edge Network.

Installing the Splashtop Secure Workspace Desktop Application

To enable the security features like Unified Network Access, Secure Device Enrollment, and Posture Enforcement, follow these steps:

  1. Log in to your organization's Splashtop Secure Workspace home page.
  2. Navigate to DevicesDownloads and select the appropriate desktop application for your devices.
  3. Download and install the Secure Workspace desktop application on your device.
  4. Launch the application and log in using your organization's Splashtop Secure Workspace credentials.
  5. Congratulations! Your device is now securely connected to Splashtop Secure Workspace through the desktop application. You can begin utilizing Unified Network Access, Secure Device Enrollment, and Posture Enforcement on your device.

Extending Your Private Network to the Edge Network

In order to gain centralized control over your private applications, it is necessary to extend your private network to the Splashtop Secure Workspace Edge network. This can be achieved by deploying a connector within your private network. The connector serves as an extender, facilitating the connection between your private network and the Edge Network. You have multiple deployment options for the connector, including Linux service, docker container, helm chart, or cloud VM. Additionally, the desktop application itself can act as a connector, effectively extending the reach of your private network to the Edge Network.

Follow these steps to connect your private network to the Splashtop Secure Workspace Edge network:

  1. Click on the Connector tab in the Splashtop Secure Workspace interface.

    From the available options, select the edge location that is closest to your current physical location.

  2. Click on Run Connector to initiate the connection to the Splashtop Secure Workspace Edge network.

By completing these steps, you will successfully establish a connection between your private network and the Splashtop Secure Workspace Edge network.

Discover and add applications

After Splashtop Secure Workspace connects to the network edge service, you can try to discover applications that you have access to by clicking Discover applications. If no applications are discovered, check whether the local network you are connecting to has any applications or services configured for remote access.

Splashtop Secure Workspace can discover applications that use any of the following connection protocols:

  • Hypertext Transfer Protocol (HTTP or HTTPS).
  • Remote Desktop Protocol (RDP).
  • Virtual Network Connection (VNC).
  • Splashtop Desktop Protocol (SDP).
  • Secure Shell (SSH).
  • Kubernetes client API.
  • Telnet protocol.

For example, if you installed the Splashtop Secure Workspace desktop client on macOS, go to System Settings and search for Sharing and turn on Screen Sharing, a virtual network client.

If you have a virtual or physical network available for testing, turn on Remote Login to try accessing the computer using a secure shell (ssh) connection.

To discover applications:

  1. Turn on Screen Sharing or Remote Login.
  2. Verify the Splashtop Secure Workspace desktop client connector status is Connected.
  3. Click Discover applications.
  4. Select the discovered application, then click Add.

Access Applications via Web Browser

Once you have added an application to your Splashtop Secure Workspace, you can conveniently access it through a web browser. Follow these simple steps:

    1. Log in to your organization's Splashtop Secure Workspace home page.
  1. Click the Applications → Applications
    1. Locate and click on the application you recently added. The application will automatically launch in a new tab of your web browser.

Congratulations! You are now ready to securely utilize the application as an authorized user within the Splashtop Secure Workspace environment.

Access Applications via Secure Workspace Desktop Application

To securely access applications through the Splashtop Secure Workspace Desktop Application, follow the step-by-step instructions below:

  1. Download and Install the Secure Workspace Desktop Application
  2. Explore the Provisioned Applications
    1. After launching the Secure Workspace Desktop Application, you will be presented with a list of applications that have been provisioned for your access.
    2. Browse through the list to find the application you wish to connect to.
  3. Connect to the Remote Application
    1. Locate the desired application in the list.
    2. Choose the "Connect" action or click on the provided icon/button to initiate the connection process.
    3. The Secure Workspace Desktop Application will establish a secure tunnel to the remote target through the Splashtop Secure Workspace Global Edge Network.
    4. Wait for the connection to be established. Once connected, you will have secure access to the remote application.
  4. Launch the Native Application Client
    1. If you prefer to work with the remote application using its native client, click on the "Launch" icon or choose the "Launch" action provided for the application within the Secure Workspace Desktop Application.
    2. The Secure Workspace Desktop Application will first establish the secure tunnel and then automatically launch the appropriate native application client.
    3. You can now interact with the remote resources or application using the native client, ensuring a seamless and familiar working environment.

Access Applications via Secure Workspace Mobile Application

To securely access applications and secrets through the Splashtop Secure Workspace Mobile Application, follow the step-by-step instructions below:

  1. Login to the Splashtop Workspace Portal and Download the Mobile Application
    1. Open a web browser on your mobile phone or tablet and navigate to the Splashtop Workspace Portal.
    2. Log in to your account using your credentials.
    3. Once logged in, navigate to the "Devices" section and locate the "Downloads" option.
    4. Choose your mobile operating system, such as Android or iOS, and click on the download link provided.
    5. You will be redirected to either the Google Play Store (for Android) or the Apple App Store (for iOS).
    6. Install the Splashtop Secure Workspace Mobile Application from the respective app store.
  2. Launch the Mobile Application and Log In
    1. Locate the Splashtop Secure Workspace Mobile Application on your device and tap on its icon to launch it.
    2. The application will prompt you to enter your tenant name and login credentials.
    3. Provide the required information, which can include either a standard username and password or credentials for single sign-on login.
    4. Tap on the "Login" button to proceed.
  3. Explore Applications and Manage Secrets
    1. Once logged in, the mobile application will present you with a list of applications, including both private applications and SaaS applications, in the application section.
    2. Navigate through the list to find the desired application you want to access.
    3. You can also manage your secrets within the same mobile application, ensuring secure storage and easy access to sensitive information.
  4. Launch and Access Applications
    1. Tap on the application you want to launch within the Splashtop Secure Workspace Mobile Application.
    2. The application will open in a web view, providing you with a seamless experience similar to accessing the application through a web browser.
    3. If you have saved login credentials for the application, the mobile application's autofill capability will integrate with your mobile operating system, allowing for quick and convenient login.

Now that your environment is set up, you have in-depth visibility into your network activity.


Was this article helpful?

ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence