Turn any Linux server into a managed Rexec terminal with the lightweight agent.
What is BYOS Agent?
The Rexec Agent lets you connect your own infrastructure — whether it’s AWS EC2, DigitalOcean droplets, Raspberry Pi, or on-premise servers — to your Rexec dashboard. Access them through the same interface as cloud terminals.Why Use BYOS?
Use Existing Servers
Leverage servers you already have instead of spinning up new containers.
Access Anywhere
Connect to your production servers from any browser without VPN or SSH keys.
Unified Dashboard
Manage cloud terminals and your own servers in one place.
Team Access
Share server access with team members using collaboration features.
How It Works
- Install the lightweight Rexec agent on your server
- Register the agent with your Rexec account via API token
- Connect through the Rexec dashboard like any other terminal
The agent uses WebSocket connections outbound to Rexec servers. No inbound firewall rules needed.
Installing the Agent
Quick Install (Linux)
Supported Platforms
| Platform | Architecture | Status |
|---|---|---|
| Linux | amd64 (x86_64) | ✅ Stable |
| Linux | arm64 (aarch64) | ✅ Stable |
| Linux | armv7 | ⚠️ Beta |
| macOS | amd64, arm64 | ✅ Stable |
| Windows | amd64 | 🚧 Coming Soon |
Registering Your Server
Step 1: Get API Token
- Go to Settings → API Tokens in Rexec dashboard
- Click “New API Token”
- Name:
agent-myserver - Scopes: Select
agent - Copy the token (starts with
rexec_...)
Step 2: Register Agent
Step 3: Start the Agent
Configuration
Config File Location
Example Configuration
Agent Limits by Tier
| Tier | Registered Agents | Concurrent Connections |
|---|---|---|
| Free | 0 | 0 |
| Pro | Up to 5 | Up to 5 |
| Enterprise | Unlimited | Unlimited |
Agent support requires Pro or Enterprise tier. Free tier users can only use cloud terminals.
Connecting to Your Agent
Once registered and online, your agent appears in the dashboard:- Look for servers with 🖥️ icon (vs container icon for cloud terminals)
- Click “Connect” to open a terminal session
- Use exactly like any cloud terminal
Connection Indicators
- Green dot - Agent online and ready
- Gray dot - Agent offline
- Yellow dot - Agent connected but unresponsive
Managing Agents
List Registered Agents
From the dashboard:- Go to Settings → Agents
- View all registered agents with status
- See last connected time, OS, architecture
Update Agent Information
Unregister Agent
System Requirements
Minimum
- OS: Linux kernel 3.10+ (Ubuntu 18.04+, Debian 10+, CentOS 7+, etc.)
- CPU: 1 core
- RAM: 256MB free
- Disk: 50MB for agent binary
- Network: Outbound HTTPS/WSS access
Recommended
- RAM: 512MB+ free
- Packages:
bash,tmux(optional but recommended) - Network: Stable connection with low latency
Network & Firewall
Required Outbound Access
The agent initiates all connections outbound. No inbound firewall rules or port forwarding needed.
Proxy Support
Security Considerations
Authentication
- Agent uses API tokens with
agentscope only - Tokens are stored securely on disk (0600 permissions)
- WebSocket connections use TLS 1.3
Permissions
The agent runs as:- Non-root user by default (user you ran install as)
- Only needs access to shell execution
- Does not require sudo/root for terminal sessions
For systemd service installation, brief sudo access is needed. After that, the agent runs as its own user.
MFA Protection
Enable MFA on agents from dashboard:- Go to agent settings
- Enable “Require MFA for connections”
- Users must authenticate with MFA before connecting
Monitoring & Troubleshooting
Check Agent Status
Common Issues
Agent shows offline in dashboard
Agent shows offline in dashboard
Causes:
- Agent not running (
systemctl status rexec-agent) - Network connectivity issues
- Firewall blocking outbound HTTPS/WSS
- Invalid or expired API token
Connection timeout when trying to connect
Connection timeout when trying to connect
Causes:
- Agent is offline
- High network latency
- Agent overloaded (too many concurrent sessions)
- Check agent status in dashboard
- Reduce concurrent sessions
- Check server resources (CPU, memory)
Permission denied errors in terminal
Permission denied errors in terminal
Causes:
- Agent user lacks file/command permissions
- Shell not properly configured
Advanced Configuration
Custom Shell
Resource Monitoring
High Availability
For mission-critical servers:Use Cases
Production Server Access
Access production servers without VPN. Enable MFA for security.
Remote Raspberry Pi
Manage home lab or IoT devices from anywhere.
Development Workstations
Connect to your powerful desktop from a laptop or tablet.
Customer Support
Grant temporary access to customer servers for troubleshooting.
Best Practices
Security
- Use dedicated API tokens per agent
- Enable MFA for production servers
- Regularly rotate API tokens (Settings → API Tokens)
- Monitor agent connections in audit logs
Organization
- Use descriptive names:
prod-web-01,dev-db-us-east - Tag agents by environment:
production,staging,dev - Tag by location:
us-east-1,eu-west-1,on-prem
Reliability
- Run agent as systemd service for auto-restart
- Enable stats reporting to monitor agent health
- Set up log rotation for
/var/log/rexec-agent.log
Related Features
Cloud Terminals
Use cloud-based disposable terminals
Collaboration
Share agent terminals with team members
SSH Access
Connect to agents via SSH gateway
Session Recording
Record sessions on agent terminals