Secure infrastructure access and operations platform for enterprise teams and individuals
Deployment Quick Start • Security and Compliance • Licensing and Commercial Use
Infram provides a central control plane for secure remote access, identity-aware administration, automation, and audited operations across distributed Linux and mixed-protocol environments.
Infram is designed for organizations that need controlled infrastructure access, high operational traceability, and standardized runbook execution from one enterprise platform.
Core capabilities:
- Remote access over SSH, RDP, VNC, and Telnet
- Integrated remote file operations over SSH sessions
- Multi-tenant isolation with organizations, folders, and scoped identities
- NetBox integration: scheduled CMDB sync and inventory updates with role-based filters for devices and VMs
- Authentication options: local users, LDAP, OIDC/SSO and passkeys (all combined with TOTP)
- Managed scripts and snippets integradtion for repeatable operational workflows
- Session lifecycle visibility, audit events, and status checks
Image: swissmakers/infram
- Create persistent storage:
mkdir -p /opt/podman-infram- Generate a 64-character hex encryption key:
openssl rand -hex 32- Start Infram:
podman run -d \
--name infram \
--network host \
--restart always \
-e ENCRYPTION_KEY="<replace-with-generated-key>" \
-e TRUST_PROXY=1 \
-v /opt/podman-infram:/app/data:Z \
swissmakers/infram:latest- Open
http://<host>:6989.
ENCRYPTION_KEYcan also be supplied as a runtime secret file (/run/secrets/encryption_key), which is auto-loaded asENCRYPTION_KEY. (if needed)
Runtime variables:
ENCRYPTION_KEY(required): 64-char hex key used for credential encryptionSERVER_PORT(default6989): HTTP listenerHTTPS_PORT(default5878): optional HTTPS listener when cert files existTRUST_PROXY(defaultfalse): Express proxy trust policy (true,false, count, CIDR/IP list)STRICT_TLS(defaulttrue): strict certificate validation for outbound TLS integrationsENABLE_SOURCE_SYNC(defaultfalse): enables/disables custom source sync workerENABLE_VERSION_CHECK(defaulttrue): enables/disables release check endpointVITE_ENABLE_EXTERNAL_LINKS(defaultfalse): client-side external URL opening policy
- Keep Infram behind a reverse proxy, VPN, or private network boundary
- Set
TRUST_PROXYcorrectly to preserve accurate client IP attribution - Keep
STRICT_TLS=truein production unless explicitly troubleshooting - Store and rotate
ENCRYPTION_KEYusing your enterprise secrets standard - Back up
/app/databefore upgrades
Security pipeline helpers:
make security-update
make security-audit
make security-all
make security-sbom- Installation
- Reverse Proxy
- SSL/HTTPS
- LDAP
- OIDC / SSO
- Custom Sources
- Scripts and Snippets
- Scripting Variables and Directives
- API Reference
- Screenshots
- Licensing
Infram is provided under PolyForm Noncommercial 1.0.0 with additional licensor terms from Swissmakers GmbH.
- Private noncommercial users can use Infram free of charge
- Commercial usage requires a separate commercial license from Swissmakers GmbH
- Redistribution is not permitted unless explicitly authorized in writing
- Third-party support and managed services are not permitted unless explicitly authorized in writing
See LICENSE and docs/licensing.md for details.
Official product support, commercial licensing, and partner authorization are provided by Swissmakers GmbH.