Remote Access Login

This page provides links to remote access services for Aker Solutions personnel and external parties (customers, vendors and partners).

If this is your first time using the remote access login, you will have to request and then register your security token before login. You will only need to do this once; which will require you to connect to the company network or contact the IT Service Desk.

If you have already registered your token, please select an appropriate link. The different regions provide resilience and redundancy; if your regional link is unavailable, please try one of the others.

For Aker Solutions personnel

Access to company network (VPN)
This service is no longer available. You must use the Cisco Secure Mobility VPN. Please see this user guide.

Click here if you are unable to use the new system »

Access to Citrix® applications
Citrix® Global Access »
*Citrix® access via "Secure Oil Information Link" »

Old version -  use if new link does not work:
Citrix® access via "Secure Oil Information Link"»

*This requires 2 factor authentication , which is the new security standard. Information will be sent Citrix users about how to address this if they do not have it today.

Access to web based applications
Global Web Access »


Aker Solutions customer extranet sites
mySubsea™ »

The different regions provide resilience and redundancy; if your regional link is unavailable, please try one of the others.

Global remote support available 24 hours per day, seven days per week, all year round:
+47 51 85 22 00

This Aker Solutions computer system, including all related equipment, networks, and network devices (specifically including Internet access) is provided only for use as authorised by Aker Solutions. Aker Solutions computer systems may be monitored for all lawful purposes, including ensuring that their use is authorised, for management of the system, to facilitate protection against unauthorised access, and to verify security procedures, survivability and operational security. Monitoring may include active attacks by entities authorised by Aker Solutions to test or verify the security of the system. During monitoring, information may be examined, recorded, copied and used for authorised purposes. All information, including personal information, placed or sent over this system may be monitored. Use of this Aker Solutions computer system, authorised or unauthorised, constitutes consent to the monitoring of this system. Unauthorised use may subject you to criminal prosecution. Evidence of unauthorised use collected during monitoring may be used for administrative, criminal or other adverse action. Use of this system constitutes consent to monitoring for these purposes.

Copyright statement

All contents of this Site including without limitation the design, layout, graphics, photos, format, and other visual elements of the Site are protected by intellectual property rights, including but not limited to Copyright © 2015 Aker Solutions ASA (or where so indicated, any affiliates of Aker Solutions ASA or its licensors). Any rights not expressly granted herein are reserved. All ownership rights pertaining to the information and material contained on this Site, including but not limited to the Aker Solutions name, logos, trademark, graphics, photos, images, and content, are owned or have been duly licensed by Aker Solutions ASA (or any of its affiliates), WITH ALL RIGHTS RESERVED.