Recommended Steps to Implement BeyondTrust Jump Technology

When working with Jump Technology, there are a lot of moving parts. Here is a recommended order of implementation to make full use of your software.

  1. Add Jump Item Roles. Jump Item Roles determine how users are allowed to interact with Jump Items. These roles are applied to users by means of individual account settings, group policies, and when added to Jump Groups.
  2. Add Jump Policies. Jump Policies are used to control when certain Jump Items can be accessed by implementing schedules. Jump Policies are applied to Jump Items upon creation and can be modified from the representative console.
  3. Add Jump Groups. A Jump Group is a way to organize Jump Items, granting members varying levels of access to those items. Users are assigned to Jump Groups either individually, by means of group policy.
  4. Deploy Jumpoints. A Jumpoint acts as a conduit for unattended access to computers on a known remote network. A Jumpoint is necessary to use Remote Jumps, Remote RDP, Remote VNC, Shell Jumps, and Intel® vPro sessions. Local Jumps, Local RDP, and Local VNC can be performed to systems on the same local network.
  5. Create Jump Shortcuts. A Jump Shortcut is a quick way to start sessions with frequently accessed remote systems. Jump Items are created from the representative console or are imported from /login > Jump > Jump Items. When creating or importing Jump Items, be sure to set the Jump Group and Jump Policy to determine who can access the Jump Item and with what restrictions.