Is anyone familiar with putting a FRS in Azure for external agents to hit?

We are testing putting our K1000 into the DMZ so we can manage and service workstations that are not on our corporate network.   We stood up a server in Azure, installed IIS, and created a share. Now our test agents can download software if it's 100% anonymous, however we want the agent to authenticate. Our impression of how the FRS works is it uses the path (Local Share) with the kace agent to replicate from the Appliance to Server and that all clients would use the (Download Share) Credentials to authenticate. During our testing, we would not see any of our clients use or pass through those credentials. So we are running into authentication / server configuration errors based on logs. It only works anonymously. Is there an IIS setting we are missing? Maybe the path is incorrect in KACE? We would have to imagine there are other customers that have KACE publicly available that do not have all agents going direct to the appliance since we know that works.

0 Comments   [ + ] Show comments

Answers (1)

Posted by: Channeler 1 month ago
Red Belt

I don't think it's designed to work that way....

Currently, the easiest way to reach agents outside of your work network, is to deploy an Azure KACE SMA.

It's going to be public facing, so get some godaddy SSL certs.

And that's it, all the agents are going to communicate, authenticate and download payloads using the public FQDN from the SMA.


Another option, is to make the KACE SMA Public facing, I would also recommend SSL for this.


I'm also curious about your end goal here with FRS and Azure....  If you would like to share it.

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login


This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ