What is an SSH Bastion Host? An SSH Bastion host is simply a single, hardened server that you “jump” through in order to access other servers or devices on the inner network. it’s simply a server that all of your users can log into... Read More
Security Compliances
Can we use multiple 2fa? Overview: This guide describes how to configure Google 2FA, YubiKey, and DUO Security together in the web panel, enabling SSH jump host users to authenticate using their preferred method, and providing flexibility if one... Read More
Securing SSH Session Recording to Prevent Password Capture Overview: This article describes how to configure SSH session recording to prevent password capture by setting it to "Output" mode in Ezeelogin, crucial for meeting PCI DSS, HIPPA, SOC, SOC2... Read More
How to enable/disable Access Keyword 2FA (Two-factor Authentication) in Ezeelogin? Overview: This article provides step by step instructions for Ezeelogin gateway users to enable or disable and reset access keyword two-factor authentication (2FA).... Read More
What are the Encryption algorithms used in Ezeelogin? Synopsis: This article outlines the encryption technologies used for Ezeelogin SSH gateway users. The user passwords and security codes stored in the Ezeelogin database uses multiple rounds... Read More
How to view users in a specific user group? You can utilize the search button to display members belonging to a particular user group. Choose User Group from the dropdown menu and enter the specific user group's name to locate members belonging... Read More
Deleting entries in the Ezeelogin database table gwactivity_logs for house keeping. Overview: This article outlines how to expedite Ezeelogin software upgrades by truncating the 'gwactivity_logs' MySQL table based on users' login... Read More
How can I verify the SSL/TLS, HTTPS, and SSH versions utilized in an Ezeelogin Server? By default, the latest version available on the server would be used to encrypt the communication. 1. Execute the below command to find the SSL/TLS version in... Read More
How to Restrict SFTP Connections to Specific Ports? SFTP, or Secure File Transfer Protocol, is a subsystem of SSH used for securely accessing, managing, and transferring large files of data. Chroot or change root is a security feature that restricts... Read More
Setup Cloudflare ZTNA (Zero Trust Network Access) with Ezeelogin for securing SSH access Cloudflare Tunnel can also route applications through a public hostname, allowing users to connect to an SSH server with Cloudflared access. This method... Read More