Skip to main content
Version: Enterprise (1.2.0)

Getting Started

This guide will help you set up WebXTerm and connect to your first machine.

Prerequisites

Before you begin, ensure you have:

  • An active WebXTerm account
  • At least one server/machine you want to connect to
  • Admin access to your organization (for initial setup)

Step 1: Sign Up or Login

Login Page

Using OIDC/OAuth2 Login (Enterprise)

If your organization has configured an external identity provider (Okta, Microsoft, GitHub, Azure AD):

  1. Navigate to the WebXTerm login page
  2. Click "Sign in with [Provider]"
  3. Complete the authentication flow with your identity provider
  4. You'll be redirected to your dashboard

See the OIDC setup guide →

Using Email/Password (Keycloak)

  1. Navigate to the login page
  2. Enter your email and password
  3. Click "Sign In"
note

Email/password login is managed by Keycloak in Enterprise editions. Community Edition uses its own built-in auth.

Step 2: Get Your API Key

After signing in, navigate to your Profile page to find your API Key. You'll need this to register the WebXTerm Agent on your machines.

Profile Page

  • Go to Profile in the top-right menu
  • Copy your API Key — this is what authenticates the agent with your account
tip

If your API key is ever compromised, you can regenerate it from the Profile page. Note that regenerating it will disconnect all agents using the old key.

Step 3: Install & Register the Agent on Your Machine

WebXTerm works by installing a lightweight agent (vsay-agent) on the machine you want to access. The agent connects back to the WebXTerm backend over gRPC — no inbound firewall rules required.

Machines Page

Install the Agent

Download and install vsay-agent on your machine. Choose the package for your operating system and architecture:

curl -LO https://releases.vsayterminal.com/vsay-agent/latest/vsay-agent-linux-amd64.tar.gz
tar -xzf vsay-agent-linux-amd64.tar.gz
sudo mv vsay-agent /usr/local/bin/

Or via DEB package (Debian/Ubuntu):

sudo dpkg -i vsay-agent_amd64.deb

Configure the Agent

Run the configure command with your API key and the WebXTerm backend URL:

sudo vsay-agent configure \
--token YOUR_API_KEY \
--host http://your-webxterm-instance.com:8080 \
--linux-user ubuntu
FlagDescription
--tokenYour API key from the Profile page
--hostURL of your WebXTerm backend
--linux-userThe system user that terminal sessions will run as
--allow-sudo(Optional) Allow sudo commands in terminal sessions

This command will:

  1. Save the configuration to /etc/vsay/agent.yaml
  2. Install and start a systemd service (vsay-agent.service) that auto-starts on boot

Verify the Agent is Running

systemctl status vsay-agent

Once the agent starts, it registers itself with the backend and your machine will appear in the Machines dashboard within seconds.

Step 4: Connect to Your Machine

Once your machine appears in the dashboard:

  1. Go to the Machines list
  2. Find your machine — it should show Online status
  3. Click "Connect"
  4. The Web Terminal opens and you're connected directly to your machine

Next Steps

Now that you're connected, explore more features:

  • Team Collaboration - Add team members and assign roles, restrict machine access per user
  • Real-time Monitoring - Track server health, CPU/memory/disk stats from agent heartbeats
  • Audit Logs - Review command history and session activity
  • Community - Use the built-in issue tracker to report and track infrastructure problems
  • Set up OIDC/OAuth2 - Enable OIDC/OAuth2 login with Microsoft, GitHub, Okta, or Azure AD (Enterprise)

Community vs Enterprise

FeatureCommunityEnterprise
Secure Remote Access (Agent-Based)
Web Terminal
Team Collaboration (RBAC)
Real-time Monitoring
Session & Command Recording
Audit Logs
Community (Issue Tracker)
TLS Encryption
WebXTerm Shell CLI
WebXTerm VSCode Extension
API Access
mTLS (Mutual TLS)
Keycloak Authentication
OIDC/OAuth2 Login (Microsoft, GitHub, Okta, Azure AD…)
Multi-tenancy (Organizations)
Organization API
Priority Support
Enterprise Edition

Need OIDC/OAuth2 login, Keycloak authentication, or multi-organization support? See the Enterprise Edition.

Learn More

See the full feature comparison on the How We Are Different page.