version

Category: Two Factor Authentication in SSH

shape
shape
shape
shape
shape
shape
shape
shape
Standard

SSH Jump Host with Yubikey ssh two factor authentication

SSH Jump Host with Yubikey Authentication SSH Yubikey based two factor  authentication is integrated into Ezeelogin ssh jump host for extra security. Even if someone steals your username and password (which is on the increase) they cannot access your jump host without your physical key. The YubiKey generates an encrypted password that can only be

Standard

SSH Two Factor Authentication

SSH jump server with Duo two factor authentication SSH JumpHost and SSH Gateway Ezeelogin supports DUO Security two factor authentication ( 2FA ) which means that anyone having a smartphone these days can easily use it for the second layer of authentication. With DUO, you dont have to type in complex strings or numbers, just

Standard

Bastion host with MFA for PCI DSS

Bastion host with MFA for PCI DSS Bastion host with Multi-factor authentication ensures that ssh access to your Linux servers or AWS instances or cloud instances in production via the ssh jump server or ssh jump host is super secure. Why do you need (MFA) Multi-Factor Authentication? Multi-factor authentication (MFA) is designed to protect access

Standard

Automated root password management on Linux servers

Automatic root password management Boss wants you to enable password based authentication on hundred  Linux server, he wants you to  set 30 plus character strong password on each server, share the root passwords with  developers ,  change the root passwords again once the developers logs out of the servers at the end of the day,

Standard

Meet Security Compliance in SSH

How to meet PCI DSS 3.2 , HIPAA , SOX , SOC2 , FFIEC , NERC CIP , ISO 27001 compliance in your Linux Infrastructure? If you are a system administrator  and have bunch of Linux server that you need to manage and has to be PCI DSS3.2 ,SOX, SOC2, FFIEC, NERC CIP, ISO 27001,

Standard

Secure and harden SSH Bastion host?

Secure and harden SSH Bastion host?   1. Enable a firewall and by default block all  IP access to the SSH Port and enable only your staff ips or dynamic ip ranges that you trust. 2. Disable direct root login. Its always better to login as a non privileged user first and the switch to