Implementing Remote Browser Isolation (RBI) with Kasm Workspaces

Posted by cw_l on March 30, 2026 · 5 mins read

This has been tested successfully on the following setup.

  • Kasm Workspaces v1.18.1
  • Ubuntu 24.04 LTS

You’ll need an old PC, a mini-PC, a cloud VM or an on-premise VM. Here are the specs that I used.

  • 4 vCPUs
  • 4 GB RAM
  • 100 GB SSD

Guides:

To be successful in implementing RBI via Kasm Workspaces, it is beneficial to read these guides.

Why RBI

You probably used Remote Browser Isolation (RBI) solution in your work environment and you might be wondering if you could use it at home for a reasonable fee or free. Or you might be working in a non-profit organisation or SMB/SME and would still like to use RBI to protect your work environment without straining your budget. You might want to consider using Kasm Workspaces. Check out its licensing page for more information.

So, why RBI for home use? For anonymous browsing, you could use the Tor browser installed directly on your laptop/desktop and even smartphones/tablets. But these days, these suspicious/malicious websites may not work well with Tor. Also, there’s always a risk of drive-by downloads. I wanted an ephemeral browser that does not disclose my public IP, does not allow for easy fingerprinting of my identity, does not expose my laptop to malware while exploring these suspicious URLs that I received from my junk emails.

I’m using Kasm Workspaces CE for home usage in this setup. The installation steps are not covered here as they’re well covered in the official documentation. Instead, I’ll be highlighting some of the teething issues I experienced and how they were resolved.

RDP Errors

You might experience RDP connectivity errors on a fresh default installation without doing any custom configurations. RDP Connectivity Errors
Do these checks at your host VM.

sudo hostnamectl set-hostname kasm01
  <hostname>

sudo nano /etc/hosts 
    127.0.0.1   localhost
    127.0.1.1   <hostname>    # change the IP to your actual host IP, e.g., 192.168.13.138

If your hostnames do not much, fix it. And if your is not pointing to localhost and not its IP address, fix it. Next, restart Kasm and monitor if the errors come back.

sudo /opt/kasm/bin/restart

Brave Browser Workspace (for RBI)

You are free to select a different browser such as Firefox or Chrome. There’s also the Tor Browser workspace, if your use-case requires it. For added anonymity, you could add a egress provider to the Brave workspaces. I’d selected Proton VPN as its free tier offers download of the OpenVPN and Wireguard config files. If you’ve a paid subscription for Windscribe, the configuration steps are similar. By browsing via VPN, my public IP address is not disclosed to the suspicious web servers.

You could create a ProtonVPN egress provider with multiple egress gateways using OpenVPN. This allows you to select any egress gateway when launching the Brave workspace.

  1. Add a new egress provider. Login as admin. Infrastructure > Egress Providers > [+ Add]. Provide a name, e.g: ProtonVPN, select OpenVPN and ensure Enabled. Add Egress Provider

  2. Now that you’ve an egress provider, you could proceed to add multiple egress gateways to it. Edit Egress Provider

    You should download your OpenVPN config files from your Proton VPN dashboard, selecting the servers you want/like. Do not paste the entire OpenVPN config file into the configuration text-area. Remove the comments and the 3 lines as shown. Add Egress Gateway

    Repeat for as many servers you want/need. This alllows for redundancy. Add Egress Gateway

  3. Edit the Brave workspace to add new Egress Provider and Egress Credentials.
    Edit Brave workspace
    Add Egress Provider to Brave workspace
    Add Egress Creds to Brave workspace

  4. Launch your Brave workspace to validate that it is connected to the VPN. Login with your user account and select the Brave workspace. Launch Brave
    Launch Brave