Access Your Tehama Desktop In One Click
We’ve made it quick and easy to launch a virtual machine (Windows and Linux) from the Desktops page in your corporate Tehama portal, and depending on your permission set, you’ll have visibility over your entire organization’s fleet.
Staff members, the most basic permission set typically assigned to users who only access Tehama desktops, start their journey from the Desktops page and, as long as they’ve been assigned a desktop and have installed the client, simply press the CONNECT button to launch into action. Our desktops can be accessed from Windows, Linux, Mac, and Chromebook machines.
While working on the virtual desktop, users can choose a multi-monitor setup from the client options. With regards to their workflow, users can also access time sensitive credentials, files, even apps that have been shared within the desktop’s associated Room. Tehama Rooms have the option to prevent users from downloading files from the virtual desktop to their physical machine.
From your desktop, you can access the internet and any private networks that your Tehama Room is connected to.
Watch this video for a demonstration of the desktop connection experience.
To learn more about our desktops, here are some useful links that might help you along.
- General overview of Tehama desktops
- Accessing files, applications and credentials from within a Tehama desktop
Define access controls for your staff
Your team’s virtual desktops are centrally managed from within a Tehama Room. From here, conditions such as firewall rules and DNS filters can determine what the virtual desktops can access on the internet and private or public networks. A single Room can connect to multiple target networks or subnets.
Many of our customers build Rooms for specific projects because they can define a strict set of rules around what can be accessed and by whom for that particular work. Some Rooms are created with a geographical region in mind to support a global workforce and provide the best possible desktop experience for each individual. Other Rooms are created to support contractors since the access to data can be clearly defined and audited.
Access to the Room’s networking options, under the ‘Connection’ tab, is limited to managers and administrators. From this page, users can establish new connections to their network and further define access rules from the Firewall Rules and DNS Filtering pages. By default, trial Rooms are set to a single connection with full internet access.
Here are some additional links regarding Rooms and how to define access rules:
- An introduction to Tehama Rooms
- Configuring your Multi-path Room
- About firewall rules and DNS filtering
Adding people, contractors, and organizations
Enabling a hybrid workforce can include your own organization’s staff, third-party contractors, or you might be a service provider supplying a workforce for your customers. Tehama’s user management features provide a secure means to support each of these use cases.
In a standard Room, you define the network access rules. Other organizations, such as third-party contractors, can be invited into the Room. The invited organization(s) can propose members into the Room but you retain the rights to approve or reject Room membership. You control what can be accessed and by whom. By inviting a separate organization into the Room, you can clearly identify your own staff from the contractors.
Service providers can create Rooms but delegate the networking ownership to their customer. During the Room creation process, there is an option to connect the Room to another organization. In doing so, the service provider pays for the infrastructure (Room and desktops) but the customer owns the access rules. This relationship permits the customer to approve/reject Room membership and provides them a means to audit access to their environment.
Once a person has been added to a Room, they can receive a Tehama desktop.
A member can be invited directly from within a Room and assigned a role. Once that person has been added/approved, a desktop can be created from any existing desktop template.
Adding your staff to Tehama can also be done by importing a CSV or connecting to your identity provider of choice by using our SAML/SCIM integration.
Tehama supports SSO and multi-factor authentication.
For more information around user management, have a look at some of our supporting documentation below:
- Adding members to your organization
- Authentication options
- Custom roles and permissions
- Roles User Guide
Desktops ready in minutes
Once people have been added to the Room, they’ll be able to work securely within the Room’s defined constraints on virtual desktops specifically tailored for their use case. Providing Room members a desktop is as easy as selecting a desktop template and assigning it to the desired recipients. This creates individual machines and within minutes, they’re able to login.
A desktop template consists of an OS (Windows or Linux), an image (base or custom), and a set of specifications including RAM, CPU, and storage.
During the template creation process, there is an option to enable administrative rights on all desktops created from that template.
Desktop images can be customized and used in templates. A manager can modify their desktop and then from the Desktops page, choose the CREATE IMAGE option. Once that process is complete, a new template can be created leveraging the custom image.
If managing images isn’t your thing, our Tehama Rooms include a feature which provides a means to upload apps onto a partition drive on desktops created in that Room. The App Vault can also be leveraged by DIA, our Desktop Intelligence Automation tool to install and update apps on the end user’s behalf.
Learn more about our Tehama desktops here:
Support your end users
IT managers can centrally manage all their organization's physical and virtual desktops with DIA (Desktop Intelligence and Automation) which is an add-on tool to the Tehama platform that simplifies remote device management, lowers operating costs, and reduces downtime.
DIA helps organizations secure, audit and optimize end user devices by providing deep insights on performance and user experience as well as providing an automated way to remediate problems at the desktop level.
Audit all work
Every action performed from the moment a Tehama Room is created to the moment it is decommissioned is logged. The assigned owner can observe in real-time any work being delivered inside a Tehama Workroom from any contractor anywhere in the world. When a problem occurs, session recordings can be used to quickly identify, investigate and fix the issue.
Managers and administrators have access to a variety of reports, session recordings (if enabled), and the Activity Stream, to view all the events that have taken place on or to your organization (including its Rooms) since its creation.
For more information on our auditing features, please visit our auditing and reports documentation.