External Party Access Governance (OEM/SI)

Enable external parties to gain approved, time-limited, and scoped access with full session visibility—ensuring least privilege by default.

Persistent, Unscoped External Party Access

External parties often connect with shared VPN accounts that never expire. Who accessed what and when is unclear; scope is too broad and revocation is slow. Audits become painful while operational risk and compliance overhead rise.

The RoltekConnect Cloud Advantage

Industrial-grade security

Zero-trust tunnels, modern ciphers, MFA/SSO, and firewall/ACL keep access locked down.

JIT access & approvals

Time-bound windows with one-click approvals; access opens only when needed, then auto-closes.

Scoped access & least privilege

Per-asset policies, role-based permissions, and port/protocol limits reduce blast radius.

Full session auditing & instant revoke

Session logs/recording for compliance, plus a kill-switch to terminate access immediately.

Typical Remote Tasks

Common actions technicians perform securely over RoltekConnect Cloud.

  • Alarm / Fault Diagnosis
  • Program / Parameter Update
  • Firmware / Config Management
  • Modbus / Register Validation
  • Network Troubleshooting (WAN/LAN)
  • Post-Maintenance Verification

Deployment Options

Why it matters: Accelerates purchasing and rollout.

  • Routers: RLTK421 — LTE + RS-485/RS-232 / RLTK451 — LTE + Wi-Fi + dual Ethernet

  • Cloud: RoltekConnect Cloud (fully managed)

  • On-Site: DIN-rail mounting, −20…+70 °C, surge/ESD protection, hardware watchdog

  • Time to value: First connection in < 15 minutes

How RoltekConnect Cloud Solves It

Turns external party access into a request → approve → operate flow that’s temporary, scoped, and fully auditable.

  1. 1

    Request

    An external party requests access to a specific asset + time window (e.g., Line-3 / PLC-120, 2h). Adds purpose/work order; routes for approval.

  2. 2

    Approve

    Owner approves with one click; role, scope (ports/protocols) and expiry are auto-enforced. Access opens only for the approved window.

  3. 3

    Operate

    The external party connects through a zero-trust tunnel; session is logged/recorded. When time’s up—or revoked—access auto-closes.

Outcomes & KPIs (Before/After)

Makes value measurable.

Truck-rolls
0%
reduction (remote-first)
MTTR
0%
faster (JIT + scoped access)
Audit time
0%
less time (full session logs)
Persistent access
0%
shared VPN accounts

It replaces perpetual shared VPNs with a request → approve → operate flow that is role- and time-bound. It enforces the principle of least privilege by default.

 

 

Access is managed via JIT (Just-in-Time) access and approvals. It opens only for the approved scope (including port/protocol limits) and duration, and then auto-closes.

It’s ensured by maintaining full session logs and recording. These records are used for audit and compliance, and immediate termination is possible with a kill-switch in case of risk.

How long does it take to set up and start using the system?

The time to establish the first secure remote connection and start using the system is specified as less than 15 minutes.

Frequently asked questions

Get quick answers to all your questions about our Vendor Access Governance (OEM/SI) solution. We have compiled the most common inquiries regarding security, process, and system deployment.