Introduction
Welcome to Alpacon - secure server access that works for humans and machines alike.
One platform, two perfect experiences
Alpacon provides powerful server access optimized for how you work:
For humans: Secure browser-based terminal with multi-factor authentication
# Open terminal in your browser - no SSH client needed
# Strong MFA protection, session sharing, full audit trails
alpacon websh production
For machines: Simple API calls for complete automation
# Deploy with a single command in your CI/CD pipeline
alpacon websh production "deploy latest"
What is Alpacon?
Alpacon is a unified access platform that makes server access both human-friendly and machine-friendly. Engineers get a powerful web terminal with enterprise security. CI/CD pipelines get simple APIs. Everyone gets managed security - we handle authentication, authorization, audit logging, and compliance automatically.
The best of both worlds
๐งโ๐ป Human-friendly features
- Browser-based terminal: Full terminal access from any browser - supports vim, colors, special keys
 - Multi-factor authentication: Enterprise-grade security with TOTP/SMS
 - Session sharing: Collaborate in real-time for debugging or pair programming
 - Visual file transfer: Drag-and-drop files with WebFTP
 - Zero client setup: No SSH clients, no VPN software, works instantly
 
๐ค Machine-friendly features
- Everything is an API: Every action available programmatically
 - CI/CD native: One-line integration with any pipeline
 - Bulk operations: Execute commands across multiple servers
 - Personal access tokens: Secure, revocable tokens for automation
 
๐ Security for all
Whether accessed by humans or machines, Alpacon provides:
- Zero-trust architecture: Every request verified
 - No exposed ports: Servers only make outbound connections
 - Complete audit trails: Every action logged with full context
 - Compliance-ready: Comprehensive logging and controls for regulatory requirements
 
Real-world scenarios
Morning standup: Human access
# Engineer opens browser, logs in with MFA
# Instantly access any authorized server
alpacon websh staging
 
# Share screen with team for debugging
alpacon websh production --share
 
# Transfer files with drag-and-drop
# No SFTP client needed
Midnight deployment: Machine access
# GitHub Actions runs automatically
- name: Deploy to production
  uses: alpacax/alpacon-action@v1
  with:
    server: production
    command: |
      docker pull myapp:latest
      docker-compose up -d
API integration for custom tools
// Your internal tools can use the same API
const response = await fetch('https://your-workspace.us1.alpacon.io/api/events/commands/', {
  method: 'POST',
  headers: {
    'Authorization': 'Token YOUR_TOKEN',
    'Content-Type': 'application/json'
  },
  body: JSON.stringify({
    server: 'production',
    command: './deploy.sh'
  })
});
The problem weโre solving
Traditional server access wasnโt built for modern DevOps:
| Traditional Approach | Alpacon Approach | 
|---|---|
| Manual SSH key distribution | API tokens - Generate and revoke programmatically | 
| VPN client configuration | No client needed - Works anywhere with HTTPS | 
| Firewall rules and IP whitelisting | Zero-trust - Identity-based, not network-based | 
| Manual security updates | Managed security - We handle patches and compliance | 
| Scattered audit logs | Centralized logging - Every action tracked automatically | 
| Complex automation | Native API/CLI - Built for automation from day one | 
How Alpacon works: triple-layer security, zero complexity
Alpacon implements an Independent Triple-Layer Security architecture that provides enterprise-grade security without the complexity:
Layer 1: Access Gateway
- Reverse connection protocol: Servers connect out to Alpacon, eliminating exposed SSH ports
 - Cloud-based access: Reach any server from any browser, no VPN required
 - Built-in tools: Websh (terminal), WebFTP (file transfer), Deploy Shell (batch operations)
 - Zero attack surface: No inbound ports, no SSH brute-force attacks possible
 
Layer 2: Authentication Guard
- Multi-factor authentication (MFA): Additional security layer for all access
 - Role-Based Access Control (RBAC): Three-tier permission system (User, Staff, Superuser)
 - Personal access tokens: Secure API authentication for CI/CD integration
 - Centralized identity: Single source of truth for all server access
 
Layer 3: Audit Trail
- Complete activity logging: Every command, file transfer, and action recorded
 - Real-time monitoring: Server resource usage and status at a glance
 - Anomaly detection: Automatic alerts for suspicious activities
 - Compliance ready: SOC 2, ISO 27001, GDPR, HIPAA compliant logging
 
The result: Managed security, zero overhead
You write simple commands. We handle all the complex security. No certificates to manage, no keys to rotate, no firewalls to configure.
Who uses Alpacon?
๐ฉโ๐ป Software Engineers
Access servers instantly from your browser:
- Debug production issues with full terminal access
 - Share sessions with teammates for collaborative troubleshooting
 - Transfer files with simple drag-and-drop
 - No SSH keys to manage or VPN to connect
 
๐ง DevOps Engineers
Automate everything with APIs:
# GitHub Actions, GitLab CI, Jenkins - all work the same
- name: Deploy application
  run: |
    alpacon websh production "docker pull latest && docker-compose up -d"
๐ก๏ธ Security Teams
Sleep better with managed security:
- Every access request goes through MFA (for humans) or secure tokens (for machines)
 - Complete audit trails for compliance
 - No exposed SSH ports or permanent credentials
 - Instant access revocation when needed
 
๐ผ IT Managers
Simplify operations:
- Onboard new engineers in minutes, not days
 - Centrally manage access for all servers
 - Reduce help desk tickets (no more SSH key issues!)
 - Meet compliance requirements effortlessly
 
Why developers love Alpacon
โWe replaced 500+ SSH keys with 5 lines of YAML. Our deployment time went from 30 minutes to 3 minutes.โ โ DevOps Lead, Fortune 500
โSecurity audits used to take weeks. Now we just share the Alpacon dashboard. Instant compliance.โ โ CTO, FinTech Startup
โNo more โworks on my machineโ issues. Everyone accesses production the exact same way.โ โ Platform Engineer, E-commerce
Core concepts
Alpacon is built on several key concepts. Hereโs a quick overview - for detailed information, see our Key Concepts guide.
Workspace: Your organizationโs isolated environment containing all servers, users, and configurations.
Alpamon agent: Lightweight software installed on your servers using reverse connection (outbound only) for maximum security.
Web-based tools: Websh (terminal), WebFTP (file transfer), and Deploy Shell (batch operations) - all accessible from your browser.
IAM (Identity and access management): Role-based access control with three tiers (User, Staff, Superuser) and flexible user groups.
Authentication & MFA: Enterprise-grade authentication powered by Auth0 with support for hardware security keys, biometric authentication, and TOTP apps.
โ Learn more in the Key Concepts guide
Use cases
Alpacon is perfect for:
Development teams
- Accessing development and staging servers
 - Debugging production issues
 - Collaborative troubleshooting
 - Database administration
 
DevOps automation
- CI/CD pipeline integration
 - Automated deployments
 - Infrastructure as code execution
 - Scheduled maintenance tasks
 
Managed service providers
- Secure customer server access
 - Multi-tenant isolation
 - Audit trails for client compliance
 - Simplified engineer onboarding
 
Compliance requirements
- Financial services (PCI DSS, SOX)
 - Healthcare (HIPAA)
 - Data protection (GDPR)
 - Government contractors (FedRAMP)
 
Getting started in 3 steps
Step 1: Register your server (1 minute)
In your Alpacon workspace, go to Servers โ Connect Server, enter server details, and run the generated installation script on your server.
See the Quickstart guide for detailed steps.
Step 2: Get API token (1 minute)
Create an API token in your workspace settings for programmatic access.
Step 3: Start using (immediate)
# CLI
alpacon websh myserver "ls -la"
 
# REST API
curl -X POST https://your-workspace.us1.alpacon.io/api/events/commands/ \
  -H "Authorization: Token YOUR_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{"server": "myserver", "command": "ls -la"}'
Thatโs it. No SSH keys to generate. No VPN to configure. Just simple, secure access.
Architecture overview
Alpacon uses a unique reverse-connection architecture:
Servers connect out to Alpacon, not the other way around. This means:
- No firewall changes needed
 - Works behind NAT
 - No exposed ports
 - Automatic failover
 
The Alpacon difference
Traditional tools werenโt built for automation
- SSH: Manual key management, no programmatic control
 - VPN: Network-level access, not application-aware
 - Bastion hosts: Another server to manage and secure
 
Alpacon is API-first by design
- Everything is programmable: Every action available via API/CLI
 - Machine-friendly: Built for automation, not just humans
 - Security is managed: We handle the complex security, you just use simple commands
 - DevOps native: Integrates with your existing tools and workflows
 
Next steps
Now that you understand what Alpacon is and how it works, continue with:
- Installation guide - Set up Alpamon on your servers
 - Key concepts - Deep dive into Alpacon components
 - Quickstart tutorial - Get hands-on in 5 minutes
 
Questions?
- Check our FAQ for quick answers
 - Join our Discord community for real-time help
 - Review troubleshooting guides for common issues
 - Email support at support@alpacax.com
 
Welcome to the future of server access management. Letโs get started!