UseCase12_RemoteApp - sandersdHES/PAMEmergingTech GitHub Wiki
This use case demonstrates how to configure RemoteApp access using PAM360, allowing users to launch only specific applications on a remote Windows server—without giving them full desktop access. This enables fine-grained control for scenarios such as:
- Allowing external or low-privileged users to use specific apps (e.g., WordPad) securely
- Preventing misuse or accidental modifications on the host system
- Maintaining a least-privilege approach while offering necessary tools
Instead of granting remote desktop access to a full system—which poses potential security risks—RemoteApp allows access to individual applications in isolation. PAM360 provides a streamlined way to manage and restrict these sessions.
- A Windows Server with Active Directory and DNS configured
- PAM360 is installed and accessible
- The MEAMP agent is installed on the Windows Server (see next step)
- RemoteApp feature is supported only on Windows machines
Our scenario: We want a user to remotely launch only WordPad on a Windows Server, without having access to other applications, files, or system resources.
-
Follow the official Landing Server Setup Guide
→ This configures your Windows Server as a Landing Server for remote sessions.
-
Continue with the RemoteApp Configuration Guide
→ Ensure the MEAMP (ManageEngine Application Manager Plugin) is installed on your Windows Server.
→ Add WordPad to the list of available RemoteApps.
Once your environment is ready:
-
Navigate to Admin > Remote App
-
Click Add and choose your configured Windows Server
⚠️ Only Windows OS is supported for RemoteApp

In the Remote App configuration:
- Select the applications (e.g., WordPad) you wish to make accessible
- These will be the only apps available for selected users


To apply RemoteApp restrictions to a specific machine:
- Go to Resources
- Select the target Windows VM
- Click Associate > Associate RemoteApp

- Choose the app(s) you want to allow (e.g., WordPad)

Create a user with the Connection User role:
- This role allows launching apps only, without access to credentials or passwords
- Navigate to Admin > Users > Add User, and select Connection User as the role

Now that the user and the app are ready:
- Share the configured resource with the new user
- Under sharing settings, select RemoteApp Only
- Choose WordPad from the list of available apps


The user can now:
-
Go to Connections in PAM360
-
Click on the Windows VM shared with them

PAM360 launches only the specified app (e.g., WordPad) in a remote session—no desktop access is granted.

This use case illustrates how RemoteApp in PAM360 enables secure, application-specific access to Windows servers:
- Users can access only authorized applications, not the full system
- Ideal for temporary contractors, external collaborators, or limited-use scenarios
- Supports centralized control, session logging, and full auditability
You now have a tightly scoped, secure RemoteApp setup using PAM360—fully aligned with modern least-privilege and zero-trust principles.