Peer Approval for Remote Worker Access with NetBird

For organizations embracing remote work, ensuring secure network access for distributed teams is a paramount challenge. Traditionally, VPNs and remote desktop solutions have been the standard for granting access to company resources. However, these methods often fall short in today's dynamic work environment, especially when dealing with freelancers and temporary workers.

The conventional approach to remote worker access presents several security and operational challenges:

  • Increased Security Risks: Granting blanket access to network resources can expose sensitive data to potential breaches, especially when dealing with external collaborators.
  • Device Management Complexity: Ensuring that only authorized and secure devices connect to the network becomes increasingly difficult as the number of remote workers grows.
  • Lack of Granular Control: Traditional solutions often lack the flexibility to implement fine-grained access policies based on user roles and device trust levels.
  • Scalability Issues: As teams expand and contract, managing access for a fluctuating workforce can become a time-consuming and error-prone process.

This guide introduces NetBird's Peer Approval as a robust solution for secure remote worker access by:

  • Implementing Zero-Trust Principles: Ensuring that every device and user is verified before granting network access, regardless of their location.
  • Simplifying Device Trust Management: Providing a streamlined process for approving and managing trusted devices within the network.
  • Enhancing Access Control: Offering granular control over network resources, allowing organizations to tailor access based on user roles and device status.
  • Improving Scalability: Facilitating easy onboarding and offboarding of remote workers, including freelancers, without compromising network security.

Let's explore the step-by-step process of implementing Peer Approval with NetBird to ensure that only trusted devices can access your network.

Prerequisites

To replicate this use case, you'll need the following prerequisites:

  • An main NetBird account with administrative privileges.
  • A secondary email address not linked to any NetBird account to simulate the freelancer's email.
  • NetBird installed on the main device.

With these prerequisites in place, you're ready to simulate granting network access to a temporary remote worker using NetBird's Peer Approval feature by:

  1. Setting up NetBird's access control policies for enhanced security
  2. Enabling peer approval
  3. Inviting users to join your network
  4. Installing NetBird on the remote worker device
  5. Approving peers
  6. Automating peer approval with EDR integration (optional)

1. Setting Up NetBird's Access Control Policies For Enhanced Security

Before onboarding remote workers, ensure your organization has appropriate access control policies in place. Adhering to zero-trust principles, create or modify policies to grant new users access only to necessary resources.

Navigate to Access Control > Policies in the NetBird admin console, then click Add Policy or edit an existing one to define these restrictions. Here's a sample policy that grant any member of the Freelancers group access to the resources in the group On-Premise-DB.

NetBird Freelancer Access Control Policy

If necessary, you can also set posture checks for this policy.

NetBird Freelancer Posture Check

Moreover, it is a best practice to disable the Default policy to enforce only restrictive, custom-defined access controls.

NetBird Access Policy View

With appropriate access policies in place, you're ready to enable NetBird's Peer Approval feature.

2. Enabling Peer Approval

To enable peer approval, go to Settings > Authentication and activate the Peer approval toggle, then click Save Changes.

NetBird Freelancer Device Dashboard

With Peer Approval activated, new members will see an Approval required message when joining. Administrators must grant access, ensuring only vetted users enter the NetBird network, thus enhancing overall security.

3. Inviting Users to Join Your Network

To invite a new user to join your NetBird network, go to Team > Users and click the Invite User button.

NetBird Invite Users

A pop-up window appears for new user registration. Enter the user's name, email address, and select the Freelancers group from the dropdown menu. NetBird's auto-assignment feature instantly links the new user to the Freelancers group upon network entry, automatically applying the associated access policy you just created.

NetBird Invite User Pop Up

After clicking Send Invitation, you'll return to the Users dashboard. Here, the new user appears with a Pending status, awaiting their acceptance of the invitation and any required approvals.

NetBird New User Pending

4. Installing NetBird On The Remote Worker Device

Access the secondary email account used to mimic the freelancer. In the inbox, locate the invitation email from NetBird. This email contains a secure link to join your organization's NetBird network, initiating the freelancer's onboarding process.

Email NetBird Invitation

After clicking the invitation link, you'll be directed to NetBird's secure account creation page. Follow the on-screen instructions to create a new password.

NetBird Login

Upon logging in, you'll arrive at NetBird's Peers dashboard. Locate and click the Add Peer button to initiate the Getting Started Wizard, which guides you through the process of adding a new device to the network.

NetBird Freelancer Peers Dashboard

The wizard will detect your operating system and provide detailed step-by-step instructions on how to install NetBird.

NetBird Freelancer Install Client

During your initial connection to NetBird, a system dialog will appear requesting authorization. This prompt asks for permission to access your profile and email information, which is necessary for NetBird to establish your account and network access.

NetBird Authorize App

After completing the installation, your device will appear in the Peers dashboard. Hover over the +1 in the Assigned Groups column to confirm the device has automaticaclly assigned to the Freelancers group as expected.

NetBird Freelancer Peers Listed

5. Approving Peers

Back to your primary account, you'll notice the newly added user's status is now displayed as Active in the Users dashboard. This status update confirms that the device has successfully added to the NetBird network and is ready for secure communication.

NetBird Peers Dashboard

However, your approval is required before the user's device can fully connect to the NetBird network. To grant network access:

  • Navigate to the Peers dashboard
  • Locate the newly added device
  • Click the Approve button next to the device
  • Confirm the action when prompted

NetBird Approve New Peer

After approval, the device is granted full access to network resources allocated to the Freelancers group. The freelancer can now view all accessible network resources in their Peers dashboard:

NetBird Freelancer Peers View

Likewise, as an administrator, you can click on the user's device to see which resources and peers the freelancer has access to.

NetBird Main Account Peers View

6. Automating Peer Approval with EDR Integration (optional)

NetBird's EDR (Endpoint Detection and Response) integration enhances network security by restricting access to devices managed by your organization's IT department. This feature synchronizes the list of devices managed by the EDR platform via API and verifies the presence of the EDR agent on each device. If the agent is not installed, access to the network is blocked.

Key aspects of NetBird's EDR integration:

  • Supports CrowdStrike Falcon
  • Allows selective application of EDR checks to specific device groups
  • Automates peer approval process for trusted devices
  • Available only in the cloud version of NetBird

To activate this feature, navigate to Integrations > EDR and activate the CrowdStrike integration toggle.

NetBird EDR Integration

For more information regarding NetBird's EDR integration, refer to the documentation