1.1 What is Thinfinity® Workspace?

Thinfinity Workspace is a solution designed to provide secure and seamless remote access to a wide array of resources, including applications, desktops, and other digital assets, from virtually any device equipped with a web browser. It leverages the power of the modern web browsers to eliminate the need for traditional client-side software installations, thereby streamlining deployment processes and simplifying ongoing management. Think of it as delivering the core benefits of a Virtual Desktop Infrastructure (VDI) solution — such as centralized management and enhanced security — without the inherent complexities and high costs often associated with traditional VDI deployments. Thinfinity Workspace offers a more lightweight, agile, and cost-effective approach to remote access.

Product Modules

  • Main Workspace — The Thinfinity Workspace main web module acts as the primary user-facing portal, offering a centralized point for end-users to find, launch, and engage with their assigned remote applications and desktops. This module features a customizable interface that organizes and presents access to various remote resources, such as RDP, SSH, and web applications. This setup allows users to initiate secure connections based on their authenticated permissions and pre-configured Access Profiles. Beyond user access, the module also includes configuration, statistical, and administrative functionalities accessible to web-admin and other users with granted privileges.

  • Cloud Manager — This module offers a centralized, automated interface for managing virtual machines (VMs) across diverse multi-cloud and on-premises environments, including AWS, Azure, Google Cloud, IONOS, VMware, Hyper-V, and Proxmox. It leverages Infrastructure as Code (IaC) principles to automate provisioning, scaling, and monitoring, improving resource utilization, reducing operational costs, and enhancing infrastructure efficiency and security through features like dynamic resource allocation, VM scheduling, and RBAC.

  • RPAM and Resource Reservation — This module enables scheduling and reserving access to specific remote resources, ensuring availability and traceability. It supports role-based access control and includes Remote Privileged Access Management (RPAM) capabilities, allowing administrators to configure each resource with or without an approval workflow. When enabled, the approval process uses minimal permissions and includes full audit logging, ensuring secure, just-in-time access aligned with organizational policies.

  • Audit Log — The Audit Log module provides a centralized record of all interactions across the Thinfinity Workspace environment. It captures system-wide activity involving Gateways, Brokers, and other components, enabling full traceability, operational visibility, and support for compliance and security audits.

  • Analytics — The Analytics module presents session and connection data extracted from the centralized Audit Log. It focuses on login attempts, active sessions, device usage, and file transfers, providing time-based views supported by graphical representations. This enables administrators to monitor user activity trends and identify anomalies more efficiently.

  • Configuration Manager — This application serves as the central administrative interface for managing and configuring the Thinfinity Workspace environment. It enables administrators to define and control critical operational parameters, including gateway settings, security protocols, user access profiles, permissions (including RBAC), Single Sign-On (SSO) integrations, and scaling/load balancing configurations, thereby facilitating the secure and efficient delivery of applications and desktops.

Infrastructure Components

  • The Gateway: which acts as the first line of defense against external threats and serves as the single external-facing entry point for all user traffic and incoming client connections.

  • The Brokers: The Primary Broker manages the overall control and authentication, while the Secondary Brokers handle the direct connections and virtualization processes in different network segments.

  • The Virtualization Agents: The agents offload the core virtualization process on the target machine.

Core Functionalities

  • Connections Management

  • Identity and Access Management

  • RPAM and Resource Reservation

  • Audit Logging

  • User Analytics

Last updated

Was this helpful?