version-new-1.png

Ezeelogin Blog

shape
shape
shape
shape
shape
shape
shape
shape
Standard

SSH Key Management

SSH key based authentication  is the default method that any Linux admin would choose for  granting ssh access to  Linux servers or Linux cloud instances. SSH key based  authentication is the preferred method since its far more secure and more popular than password based authentication. The two commonly used   keys for authentication are RSA and

Standard

Parallel Shell

Parallel shell – Run commands on multiple Linux servers or Cloud instances simultaneously If you are in charge of large server farms, cluster of Linux nodes for high performance computing, or cryptocurrency mining farms then parallel shell would easily let you manage multiple Linux servers or Cloud instances easily and quickly. Parallel shell is built into

Standard

SSH BRUTEFORCE

SSH BRUTEFORCE ATTACK: How to defend against it effectively? Hackers frequently target Linux servers and try to bruteforce the ssh daemon running on it.  If the root password that you have set is weak , the hackers would quickly gain access to your Linux server and your machines could be part of wider bot network,

Standard

SSH Two Factor Authentication

SSH JumpHost and SSH Gateway Ezeelogin supports DUO Security two factor authentication ( 2FA ) which means that anyone having a smartphone these days can easily use it for the second layer of authentication. With DUO, you dont have to type in complex strings or numbers, just tap on the smartphone screen and you are

Standard

Bastion host with MFA for PCI DSS

  Bastion host with Multi-factor authentication ensures that ssh access to your Linux servers or AWS instances or cloud instances in production via the ssh jump server or ssh jump host is super secure.  Why do you need (MFA) Multi-Factor Authentication?  Multi-factor authentication (MFA) is designed to protect access to data and applications. MFA will improve your organization’s

Standard

OpenSSH 7.0 disables DSA keys by default

The road ahead was never bright for DSA keys and the writing was clear on the wall. Ezeelogin SSH gateway will be dropping DSA keys and would be using ONLY RSA keys in future releases. Starting with the 7.0 release of OpenSSH, support for ssh-dss keys has been disabled by default at runtime due to

Standard

Automated root password management on Linux servers

  Boss wants you to enable password based authentication on hundred  Linux server, he wants you to  set 30 plus character strong password on each server, share the root passwords with  developers ,  change the root passwords again once the developers logs out of the servers at the end of the day, also your boss

Standard

Meet PCI DSS 3.2 , HIPAA , SOX , SOC2 , FFIEC , NERC CIP , ISO 27001 compliance in your Linux Infrastructure.

If you are a system administrator  and have bunch of Linux server that you need to manage and has to be PCI DSS3.2 ,SOX, SOC2, FFIEC, NERC CIP, ISO 27001,HIPAA  compliant, then look no further, Ezeelogin SSH Gateway will help you be compliant in minutes. Here are the requirements that Ezeelogin jumphost will help you

Standard

Record SSH Session

Record ssh sessions on Linux server, Amazon EC2  instances for Security Compliance It is mandatory to record ssh sessions to be PCI DSS Complaint when system administrator, system engineers or devops engineers login via ssh into your Linux machines or cloud instances, . It is also a must to maintain a log of all ssh

Standard

Bastion host – How to secure and harden the ssh server on it?

Enable a firewall and by default block all  IP access to the SSH Port and enable only your staff ips or dynamic ip ranges that you trust. Disable direct root login. Its always better to login as a non privileged user first and the switch to the root user. This is the norm if you

Features

Others