We support VPN configurations for Windows, MacOS and Ubuntu Linux. Order Details Your Name* Company Name (Owner Of Servers)* If you are a contractor enter in the name of the company who owns the servers, not yours! Email* Your email address Connection Information Your Preferred Username* Guide for picking a username: - Can contain only a-z, 0-9 and period characters. - All letters should be lower case. - Be some variation of your first and/or last name. Examples for John Doe would be: jdoe, johnd, john.doe VPN Location/Site If your company has more than one datacenter please specify which location you need the VPN to. For example: Lansing, DFW, Phoenix, etc. Your Laptop or Workstation Name(s)* List the computers you wish to access the VPN and server network FROM. Each device name must be easily referenced by you to us, for example "work-laptop" or "home-desktop". This is so we can identify and disable the specific device in the event that it is compromised or stolen. Server Access Needed* SSH/SFTP (web server, web files, deployment) Database (data access to MySQL, Redis, etc) Web (connectivity only) Note we follow "Least Privilege" security practices, each access level should be needed and will be authorized. SSH/SFTP SSH/SFTP Access - Environments* Development Staging/UAT Production Other / Specify Below SSH/SFTP Access - Server List* List the server(s) you need to connect to on the VPN/server network. SSH/SFTP Access - Permissions* SSH/SFTP Login Only (login, download, view logs, etc) Ability To Deploy Sites Ability To Modify Site Code Configuration Files (etc/site/) Other: Provide More Details Below SSH/SFTP Access - More Details* Databases Database Access - Environments* Development Staging/UAT Production (Application) Production (Reporting/Read Replicas) Other / Specify Below Server(s) You Need Database Access To* List the server(s) you need to connect to on the VPN/server network. Databases You Need Access To* List the specific database name(s) you need access to. Database Permissions*Read Only Read/Write Important Security Information VPN access inherently confer a high level of access to secure systems and must be treated with the diligence. I understand that* Each device needs its own configuration and that I cannot use the same configuration on multiple devices, copy or move the configurations between devices. I understand that* I cannot share, copy or move a configuration from one device to another. I understand that* I cannot share, copy or disclose a VPN configuration to anyone else. I understand that* If a device which has a VPN configuration on it goes missing or is stolen I will report it immediately to A-Team Systems so it can be deactivated. We can easily turn it back on if you find it later! CAPTCHA Δ