Privileged Remote Access 23.3 Supported Platforms
Android
iOS – iPhone, iPad, iPod
Linux Desktop
Fedora 37-38 |
|
|
RHEL 7.8 and 7.9 |
|
|
RHEL 8.7 and 8.8 |
|
|
RHEL 9.1 and 9.2 |
|
|
Ubuntu 20.04 LTS |
|
|
Ubuntu 22.04 LTS |
|
|
Linux Server
Fedora 37 - 38 |
|
|
|
RHEL 8.7 and 8.8 |
|
|
|
RHEL 9.1 and 9.2 |
|
|
|
Ubuntu 20.04 LTS |
|
|
|
Ubuntu 22.04 LTS |
|
|
|
Amazon Linux 2 (AL2) |
|
|
|
Raspberry Pi
Raspberry Pi OS Desktop (10-Buster) |
|
|
|
Raspberry Pi OS Lite (10-Buster) |
|
|
|
Raspberry Pi OS Desktop (11-Bullseye) |
|
|
|
Raspberry Pi OS Lite (11-Bullseye) |
|
|
|
macOS
macOS 10.15 (Catalina) |
|
|
macOS 11 (Big Sur) x86 or Apple Silicon |
|
|
macOS 12 (Monterey) x86 or Apple Silicon |
|
|
macOS 13 (Ventura) x86 or Apple Silicon |
|
|
macOS 14 (Sonoma) x86 or Apple Silicon |
|
|
All macOS clients are 64-bit as of Privileged Remote Access 18.1.
Windows Desktop
Windows 7 SP1 |
|
|
Windows 10 (21H1 and 21H2) |
|
|
Windows 11 (21H2 and 22H2) |
|
|
Windows Server
Windows Server Core |
|
|
Windows Server 2016 |
|
|
Windows Server 2019 |
|
|
Windows Server 2022 |
|
|
The above listed versions assume both 32 and 64-bit versions where applicable and reasonable.
Virtual Desktop Environments
Citrix XenDesktop 7 |
|
|
VMWare Horizon 8 |
|
|
Citrix XenApp 6.5 |
|
|
Virtual desktop environment support assumes that Privileged Remote Access clients work in a supported OS environment, virtual or otherwise.
Browser (OS)
Edge (Chromium) |
|
|
|
Firefox |
|
|
|
Safari 15.6 and 16.4 (Mac) |
|
|
|
Safari (iOS) |
|
|
|
Google Chrome |
|
|
|
Chrome (iOS) |
|
|
|
Chrome (Android) |
|
|
|
Jumpoint
Windows Server 2016 64-bit |
|
|
Windows Server 2019 64-bit |
|
|
Windows Server 2022 |
|
|
Windows 10 64-bit |
|
|
Ubuntu 20.04 64-bit |
|
|
Ubuntu 22.04 64-bit |
|
|
RHEL 8 64-bit |
|
|
Red Hat 9 |
|
|
Amazon Linux 2 (AL2) |
|
|
Privileged Remote Access supports only Microsoft's RDP server implementation built into Windows operating systems and Remote Desktop Session (formerly Terminal Services) Hosts.
DISCLAIMER: When capturing user logins via the browser developer console logs, the username/password will be captured in plain text within the log file and will be visible to anyone with access to the file. This can also occur with active session cookies. Our recommendation is to modify the HAR file to replace any secrets before uploading it to .