Ezeelogin Blog

shape
shape
shape
shape
shape
shape
shape
shape
Standard

Identity and Access Management: Securing Access Made Simple

In this digitally first world, organizations interacts with a large number of users everyday, whether it being customers, partners, employees or contractors with most of them needing safe access to the confidential systems and data. It is very difficult to manage this access manually, which is where the Identity and Access management comes into play.Management

Standard

WebAuthn & Hardware Keys: Beyond traditional 2FA

As cybersecurity threats continue to rise, traditional passwords are no longer enough to protect sensitive accounts and data. Traditional two-factor authentication (2FA) methods like SMS codes or authenticator apps were once considered strong defences, modern cyber threats have exposed their weaknesses. Attackers have learned how to intercept SMS, phish OTP codes, and even hijack authentication

Standard

Just-in-Time Access: Best Practices & Benefits

Just-in-time (JIT) access is a modern security practice which reduces risk by granting users privileges only when it is required and for a specific period, eliminating permanent access found in legacy access control models. With JIT, users don’t carry admin or privileged roles all day. Instead, they request access, get approvals, complete the task, and

Standard

OpenSSH 10.0: Security Features & Updates

OpenSSH 10.0: A Comprehensive Look at it’s Security-Driven Overhaul OpenSSH 10.0 released on April 9, 2025, marks a turning point for one of the most critical tools in modern IT infrastructure. As the de facto standard for secure remote administration, file transfer, and tunneling, OpenSSH has continuously evolved to address new threats and cryptographic trends.

Standard

Securing SSH Access with Faillock

Faillock is a security module within the PAM (Pluggable Authentication Modules) framework used in Linux systems. The pam_faillock.so module tracks failed login attempts from individual users over a defined time interval. The module automatically locks the user’s account when the number of failed attempts exceeds the configured threshold. This mechanism helps to protect Linux systems

Standard

ISO 27001 Compliance

ISO 27001 compliance is a globally recognized framework for managing and protecting sensitive information through a structured Information Security Management System (ISMS). ISO 27001 helps businesses identify vulnerabilities, implement effective security controls, and maintain regulatory compliance. Whether you’re pursuing ISO 27001 certification or strengthening your information security strategy, aligning with this standard boosts trust, credibility,

Standard

SSH Access Management

Managing SSH access to your Linux servers, routers, switches and other endpoint devices are paramount to maintaining security.   This article describes how a security administrator can manage employees SSH access to Linux endpoint devices as a non-privileged system user, escalate the privileges and limit the commands that can be executed by the employee. We will describe below

Standard

Ezeelogin with Cloudflare ZTNA

As cyber threats become increasingly sophisticated, it is paramount to ensure that your outbound SSH connections are both secure and reliable. This month, we’re diving into how you can fortify your SSH access using a powerful combination of Ezeelogin SSH Jump Server and Cloudflare Zero Trust Network Access (ZTNA). By integrating Cloudflare Tunnel with Ezeelogin

Standard

Rate Limiting in SSH

Overview:- This article describes the importance of setting rate limits to manage SSH access to remote Linux devices. It provides detailed, step-by-step instructions on configuring Remote Login Throttle Delay (RLTD) within Ezeelogin, highlighting its role in enhancing security and optimizing server management practices. How to set Remote Login Throttle Delay (RLTD) in Ezeelogin? Throttle delay in

Standard

SSH Access Management

Overview Managing SSH access to your Linux servers, routers, switches and other endpoint devices are paramount to maintaining security.   This article describes how a security administrator can manage employees SSH access to Linux endpoint devices as a non-privileged system user, escalate the privileges and limit the commands that can be executed by the employee. We will