Remote access login

  • August 29, 2014
  • 09:46

This page provides links to remote access services for Akastor personnel and external parties (customers, vendors and partners).

If this is your first time using the remote access login, you will have to request and then register your security token before login. You will only need to do this once; which will require you to connect to the company network or contact the IT Service Desk.

If you have already registered your token, please select an appropriate link. The different regions provide resilience and redundancy; if your regional link is unavailable, please try one of the others.

Global remote support available 24 hours per day, seven days per week, all year round:
+47 51 85 22 00


For Akastor personnel

Access to company network (VPN)
This service is no longer available. You must use the Cisco Secure Mobility VPN. Please see this user guide.

Click here if you are unable to use the new system »

Email Web Access (for Office 365 Mail Users)
Please see the user guide here

Access to Citrix® applications Citrix®
Global Access »
*Citrix® access via "Secure Oil Information Link" »

Old version -  use if new link does not work:
**Citrix® access via "Secure Oil Information Link"»

*This requires 2 factor authentication , which is the new security standard. Information will be sent Citrix users about how to address this if they do not have it today.

** Does not require 2 factor authentication.

Access to web based applications
Global Web Access »
Legacy Applications »
mySAP »

For external parties

Remote access for customers, vendors and partners
Access in the Americas »
Access in the Asia Pacific region »
Access in Europe »


This Aker Solutions computer system, including all related equipment, networks, and network devices (specifically including Internet access) is provided only for use as authorised by Aker Solutions. Aker Solutions computer systems may be monitored for all lawful purposes, including ensuring that their use is authorised, for management of the system, to facilitate protection against unauthorised access, and to verify security procedures, survivability and operational security. Monitoring may include active attacks by entities authorised by Aker Solutions to test or verify the security of the system. During monitoring, information may be examined, recorded, copied and used for authorised purposes. All information, including personal information, placed or sent over this system may be monitored. Use of this Aker Solutions computer system, authorised or unauthorised, constitutes consent to the monitoring of this system. Unauthorised use may subject you to criminal prosecution. Evidence of unauthorised use collected during monitoring may be used for administrative, criminal or other adverse action. Use of this system constitutes consent to monitoring for these purposes.