One script to install. Manage with CLI or API. Embed where your team already works.
Remote access that survives real networks.
Keep tunnels alive behind firewalls, allowlist predictable egress, and ship a branded operator console directly inside your product.
agent · Docker · outbound-only
agent · systemd · outbound-only
Predictable allowlisting, outbound-only networking, and an operator console that can live inside your app.
Everything operators need
Less ceremony. More control. Built for production networks.
Two IPs to allowlist. No surprise egress. No “what changed?” tickets.
Bring your domain, colors, and logo. Iframe the console in minutes.
Tiny daemon for ARM, x86, on-prem, and hybrid clouds.
Three steps
Onboard a device, claim endpoints, and ship the console.
Run the signed install script. The daemon stays outbound-only and inherits your allowlist rules.
Shell and web endpoints arrive with mTLS, roles, and audit trails—anchored to predictable egress.
Iframe a white-labeled operator console into your app and stream device controls where you need them.
Guardrails, not speed bumps
Purpose-built controls for regulated environments and real operators.
Device keypairs, short-lived tokens, and org isolation by default.
Scoped endpoints, granular roles, and audits tied to predictable allowlisting.
<2s auto-reconnect, HA gateways, and regional failover keep fleets online.
Try it in 60 seconds
Install with your signed link, confirm the agent, and embed the console—no inbound ports required.
# 1) Install + register via your signed link
curl -fsSL https://commandplane.com/i/<install-token> | sh
# 2) Verify the agent is running
sudo systemctl status commandplane-agent
# 3) Stream logs or run manually without systemd
sudo journalctl -u commandplane-agent -f
# ./commandplane-agent --config ./config.json