Security Compliances Sub-Categories

Identity & Access Management ( IAM ) (2)
Identity & Access Management or Privileged Access Management ( IAM or PAM )
Two Factor Authentication ( 2FA ) (3)
Two Factor Authentication supported
Security Compliances Articles
record ssh sessions
Viewed 7707 times since Fri, May 4, 2018
How to record ssh sessions on a Linux Server, Router, Switch using Ezeelogin ssh Jump Server? The "SSH Log" recording feature lets you record ssh sessions of system administrator, system engineers , developers ,network administrators  accessing... Read More
Can I use Google 2FA, Yubikey , DUO simultaneously?
Viewed 4054 times since Thu, Dec 14, 2017
Google 2FA, Yubikey and DUO can be configured and set for use simultaneously in the web panel.  The ssh jumphost user can set the all the three 2FA and can use any of it to authenticate depending on the users choice. If the User has forgotten to... Read More
Prevent passwords from being recorded when ssh session recording is enabled
Viewed 2769 times since Fri, Mar 2, 2018
To ensure that passwords are not recorded when ssh session recording feature is enabled on the ssh gateway server, simply set the ssh session recording to Output only which means only STDOUT is recorded. This would record only what is displayed on... Read More
Access Keyword 2FA explained
Viewed 1458 times since Wed, Jan 30, 2019
Access keywords is a two factor mechanism used for securing the GUI and the ssh backend . Ideally, it would be phrases that can be easily remembered. They should never be written down and should be stored only in your memory. Example of phrases that... Read More