Remote access login

This page provides links to remote access services for Kvaerner personnel
and external parties (customers, vendors and partners).

If this is your first time using the remote access login, you will have to request and then register your security token before login. You will only need to do this once; which will require you to connect to the company network or contact the IT Service Desk.

If you have already registered your token, please select an appropriate link. The different regions provide resilience and redundancy; if your regional link is unavailable, please try one of the others.

For Kvaerner personnel

Access to company network (VPN) 
This service is no longer available. You must use the Cisco Secure Mobility VPN. Please see this user guide.

Click here if you are unable to use the new system»
*This requires 2 factor authentication , which is the new security standard. Information will be sent Citrix users about how to address this if they do not have it today.


Access to web based applications:
Global Web Access»
Legacy Applications»

       
For external parties

Remote access for customers, vendors and partners:
Global Partner access »

Legacy access in the Americas »

Legacy access in the Asia Pacific region »
Legacy access in Europe »


Kvaerner customer extranet sites:
mySubsea™ »
LCIHUB »


The different regions provide resilience and redundancy; if your regional link is unavailable, please try one of the others.

Global remote support available 24 hours per day, seven days per week, all year round:
+47 51 85 22 00

This Kvaerner computer system, including all related equipment, networks, and network devices (specifically including Internet access) is provided only for use as authorised by Kvaerner. Kvaerner computer systems may be monitored for all lawful purposes, including ensuring that their use is authorised, for management of the system, to facilitate protection against unauthorised access, and to verify security procedures, survivability and operational security. Monitoring may include active attacks by entities authorised by Kvaerner to test or verify the security of the system. During monitoring, information may be examined, recorded, copied and used for authorised purposes. All information, including personal information, placed or sent over this system may be monitored. Use of this Kvaerner computer system, authorised or unauthorised, constitutes consent to the monitoring of this system. Unauthorised use may subject you to criminal prosecution. Evidence of unauthorised use collected during monitoring may be used for administrative, criminal or other adverse action. Use of this system constitutes consent to monitoring for these purposes.