Introduction

Welcome to Alpacon - secure server access that works for humans and machines alike.

One platform, two perfect experiences

Alpacon provides powerful server access optimized for how you work:

For humans: Secure browser-based terminal with multi-factor authentication

# Open terminal in your browser - no SSH client needed
# Strong MFA protection, session sharing, full audit trails
alpacon websh production

For machines: Simple API calls for complete automation

# Deploy with a single command in your CI/CD pipeline
alpacon websh production "deploy latest"

What is Alpacon?

Alpacon is a unified access platform that makes server access both human-friendly and machine-friendly. Engineers get a powerful web terminal with enterprise security. CI/CD pipelines get simple APIs. Everyone gets managed security - we handle authentication, authorization, audit logging, and compliance automatically.

The best of both worlds

🧑‍💻 Human-friendly features

  • Browser-based terminal: Full terminal access from any browser - supports vim, colors, special keys
  • Multi-factor authentication: Enterprise-grade security with TOTP/SMS
  • Session sharing: Collaborate in real-time for debugging or pair programming
  • Visual file transfer: Drag-and-drop files with WebFTP
  • Zero client setup: No SSH clients, no VPN software, works instantly

🤖 Machine-friendly features

  • Everything is an API: Every action available programmatically
  • CI/CD native: One-line integration with any pipeline
  • Bulk operations: Execute commands across multiple servers
  • Personal access tokens: Secure, revocable tokens for automation

🔐 Security for all

Whether accessed by humans or machines, Alpacon provides:

  • Zero-trust architecture: Every request verified
  • No exposed ports: Servers only make outbound connections
  • Complete audit trails: Every action logged with full context
  • Compliance-ready: Comprehensive logging and controls for regulatory requirements

Real-world scenarios

Morning standup: Human access

# Engineer opens browser, logs in with MFA
# Instantly access any authorized server
alpacon websh staging
 
# Share screen with team for debugging
alpacon websh --share production
 
# Transfer files with drag-and-drop
# No SFTP client needed

Midnight deployment: Machine access

# GitHub Actions runs automatically
- name: Deploy to production
  uses: alpacax/alpacon-websh-action@v1
  with:
    workspace-url: ${{ secrets.ALPACON_WORKSPACE_URL }}
    api-token: ${{ secrets.ALPACON_API_TOKEN }}
    target: production
    script: |
      docker pull myapp:latest
      docker-compose up -d

API integration for custom tools

// Your internal tools can use the same API
const response = await fetch('https://your-workspace.us1.alpacon.io/api/events/commands/', {
  method: 'POST',
  headers: {
    'Authorization': 'token="alpat-xxxxxxxxxxxxxxxxxx"',
    'Content-Type': 'application/json'
  },
  body: JSON.stringify({
    server: '7e3984de-49ab-4cc6-bcdf-21fbd35858b8',
    line: './deploy.sh',
    username: 'deploy'
  })
});

The problem we’re solving

Traditional server access wasn’t built for modern DevOps:

Traditional ApproachAlpacon Approach
Manual SSH key distributionAPI tokens - Generate and revoke programmatically
VPN client configurationNo client needed - Works anywhere with HTTPS
Firewall rules and IP whitelistingZero-trust - Identity-based, not network-based
Manual security updatesManaged security - We handle patches and compliance
Scattered audit logsCentralized logging - Every action tracked automatically
Complex automationNative API/CLI - Built for automation from day one

How Alpacon works: triple-layer security, zero complexity

Alpacon implements an Independent Triple-Layer Security architecture that provides enterprise-grade security without the complexity:

Layer 1: Access Gateway

  • Reverse connection protocol: Servers connect out to Alpacon, eliminating exposed SSH ports
  • Cloud-based access: Reach any server from any browser, no VPN required
  • Built-in tools: Websh (terminal), WebFTP (file transfer), Deploy Shell (batch operations)
  • Zero attack surface: No inbound ports, no SSH brute-force attacks possible

Layer 2: Authentication Guard

  • Multi-factor authentication (MFA): Additional security layer for all access
  • Role-Based Access Control (RBAC): Three-tier permission system (User, Staff, Superuser)
  • Personal access tokens: Secure API authentication for CI/CD integration
  • Centralized identity: Single source of truth for all server access

Layer 3: Audit Trail

  • Complete activity logging: Every command, file transfer, and action recorded
  • Real-time monitoring: Server resource usage and status at a glance
  • Anomaly detection: Automatic alerts for suspicious activities
  • Compliance ready: Comprehensive logging and controls for regulatory requirements

The result: Managed security, zero overhead

You write simple commands. We handle all the complex security. No certificates to manage, no keys to rotate, no firewalls to configure.

Who uses Alpacon?

👩‍💻 Software Engineers

Access servers instantly from your browser:

  • Debug production issues with full terminal access
  • Share sessions with teammates for collaborative troubleshooting
  • Transfer files with simple drag-and-drop
  • No SSH keys to manage or VPN to connect

🔧 DevOps Engineers

Automate everything with APIs:

# GitHub Actions, GitLab CI, Jenkins - all work the same
- name: Deploy application
  run: |
    alpacon websh production "docker pull latest && docker-compose up -d"

🛡️ Security Teams

Sleep better with managed security:

  • Every access request goes through MFA (for humans) or secure tokens (for machines)
  • Complete audit trails for compliance
  • No exposed SSH ports or permanent credentials
  • Instant access revocation when needed

💼 IT Managers

Simplify operations:

  • Onboard new engineers in minutes, not days
  • Centrally manage access for all servers
  • Reduce help desk tickets (no more SSH key issues!)
  • Meet compliance requirements effortlessly

Core concepts

Alpacon is built on several key concepts. Here’s a quick overview - for detailed information, see our Key Concepts guide.

Workspace: Your organization’s isolated environment containing all servers, users, and configurations.

Alpamon agent: Lightweight software installed on your servers using reverse connection (outbound only) for maximum security.

Web-based tools: Websh (terminal), WebFTP (file transfer), and Deploy Shell (batch operations) - all accessible from your browser.

IAM (Identity and access management): Role-based access control with three tiers (User, Staff, Superuser) and flexible user groups.

Authentication & MFA: Enterprise-grade authentication powered by Auth0 with support for hardware security keys, biometric authentication, and TOTP apps.

→ Learn more in the Key Concepts guide

Use cases

Alpacon is perfect for:

Development teams

  • Accessing development and staging servers
  • Debugging production issues
  • Collaborative troubleshooting
  • Database administration

DevOps automation

  • CI/CD pipeline integration
  • Automated deployments
  • Infrastructure as code execution
  • Scheduled maintenance tasks

Managed service providers

  • Secure customer server access
  • Multi-tenant isolation
  • Audit trails for client compliance
  • Simplified engineer onboarding

Compliance requirements

  • Financial services (PCI DSS, SOX)
  • Healthcare (HIPAA)
  • Data protection (GDPR)
  • Government contractors (FedRAMP)

Getting started in 3 steps

Step 1: Register your server (1 minute)

In your Alpacon workspace, go to ServersRegister Server, enter server details, and run the generated installation script on your server.

See the Quickstart guide for detailed steps.

Step 2: Get API token (1 minute)

Create an API token in your workspace settings for programmatic access.

Step 3: Start using (immediate)

# CLI
alpacon websh myserver "ls -la"
 
# REST API
curl -X POST https://your-workspace.us1.alpacon.io/api/events/commands/ \
  -H "Authorization: token=\"alpat-xxxxxxxxxxxxxxxxxx\"" \
  -H "Content-Type: application/json" \
  -d '{"server": "7e3984de-49ab-4cc6-bcdf-21fbd35858b8", "line": "ls -la", "username": "ubuntu"}'

That’s it. No SSH keys to generate. No VPN to configure. Just simple, secure access.

Architecture overview

Alpacon uses a unique reverse-connection architecture:

Servers connect out to Alpacon, not the other way around. This means:

  • No firewall changes needed
  • Works behind NAT
  • No exposed ports
  • Automatic failover

The Alpacon difference

Traditional tools weren’t built for automation

  • SSH: Manual key management, no programmatic control
  • VPN: Network-level access, not application-aware
  • Bastion hosts: Another server to manage and secure

Alpacon is API-first by design

  • Everything is programmable: Every action available via API/CLI
  • Machine-friendly: Built for automation, not just humans
  • Security is managed: We handle the complex security, you just use simple commands
  • DevOps native: Integrates with your existing tools and workflows

Next steps

Now that you understand what Alpacon is and how it works, continue with:

Questions?

Welcome to the future of server access management. Let’s get started!