Salient features
Ezeelogin Features Overview
Overview: This article outlines the key features provided by Ezeelogin. The platform is designed to enhance security, simplify management, and improve productivity in SSH gateway environments. Ezeelogin provides a robust suite of authentication, access control, auditing, automation, and productivity tools for managing SSH environments securely and efficiently.
1. Authentication & Access Control
1.a. Multi-Factor Authentication (MFA)
Secure your bastion host using two-factor authentication methods such as Google Authenticator, DUO Security, YubiKey, FIDO2, Access Keyword, or RADIUS 2FA.
1.b. Role-Based Access Control (RBAC)
Restrict access to remote servers based on user roles within your organization.
1.c. Privileged Access Management (PAM)
Allow non-privileged users to temporarily gain root privileges with administrator approval.
1.d. SAML Authentication
Login using Single Sign-On (SSO) for better access management and enhanced security.
1.e. AD/LDAP Authentication
Integrate Active Directory (AD) or OpenLDAP for centralized user authentication and improved user management.
1.f. OpenID Connect (OIDC) Authentication
Authenticate users using OpenID Connect (OIDC) for seamless and secure login experiences.
1.g. SSH Key rotation to remote servers
Automatically rotate SSH keys on remote servers at regular intervals to enhance security and prevent unauthorized access.
1.h. Key Management
Centralize, encrypt, and manage SSH keys within Ezeelogin to simplify access control and ensure secure key handling.
2. Security & Compliance
2.a. SSH Key Management
Encrypt and manage SSH keys securely, allowing access to the SSH gateway with a single key.
2.b. SSH User Expiry
Set expiry dates for SSH users to automatically revoke access after a specified period.
2.c. Automated Password Resets
Regularly reset root passwords on Linux nodes to maintain compliance and enhance security.
2.d. Password Strength Configuration
Set minimum password lengths, enforce expiration, rotation, and limit reuse for better security.
2.e. Password History Limit
Prevent users from reusing old passwords by setting a password history limit.
2.f. Password Expiry & Rotation
Define password expiration policies to ensure regular password updates.
2.g. Force Password Change
Require users to change their passwords after audits or suspected breaches.
2.h. Account Lockout Threshold
Prevent brute-force attacks by automatically locking user accounts after repeated failed login attempts.
2.i. Maximum Days Without Login
Automatically lock accounts if users haven’t logged in for a specified duration.
2.j. Manage Concurrent SSH Connections
Control the maximum number of SSH sessions a user can establish concurrently to prevent performance issues.
2.k. Rate Limiting in SSH Connections
Throttle or delay SSH connection attempts to manage user activity and prevent overloads.
2.l. IP Restrictions
Restrict or limit which IP addresses users can connect from to the SSH gateway.
2.m. Credential History Tracking
Maintain a record of credential changes for auditing and compliance.
2.n. Prompt Reason for SSH Access
Require users to provide a justification before accessing SSH sessions for audit tracking.
7.o. High Availability (HA)
Configure master-slave clusters to prevent single points of failure and ensure redundancy.
3. Audit & Monitoring
3.a. SSH Session and Recording
Record and monitor SSH sessions for audit purposes to track user actions and commands.
3.b. RDP Session and Recording
Access Windows servers directly through your browser using RDP.
3.c. Audit Logging
Track and log all user activities within Ezeelogin for transparency and auditing.
3.d. User Activity Reports
Generate and export user activity reports in CSV format for compliance and analysis.
3.f. SIEM Integration
Forward logs to Security Information and Event Management (SIEM) tools for centralized monitoring.
4. Productivity & Automation
4.a. Web Portals & Control Panels
Access popular web control panels directly with a single click.
4.b. Web SSH Client
SSH securely into servers directly from your browser without a dedicated SSH client.
4.c. RDP Support
Access Windows servers directly through your browser using RDP.
4.d. Command Guard
Restrict or filter commands executed on remote servers to prevent unauthorized actions.
4.e. Parallel Shell
Execute commands simultaneously on multiple servers from the gateway interface.
4.f. Automated Password Resets
Regularly reset root passwords on Linux nodes to maintain compliance and enhance security.
4.g. Secure File Transfer
Easily and securely transfer files between your desktop and remote servers.
4.h. API Support
Automate user and server management tasks by integrating with Ezeelogin’s API.
4.i. High Availability (HA)
Configure master-slave clusters to prevent single points of failure and ensure redundancy.