Skip to Content

 Security Compliances

How to secure SSH jump server / SSH bastion host / SSH gateway

How to secure SSH jump server ? Overview: This article defines what an SSH bastion host is and how to secure an SSH jump server. What is an SSH Bastion Host?    SSH Bastion host is simply a single, hardened server that you “jump” through in... Read More

Can I use Google 2FA, Yubikey , DUO simultaneously?

How to use multiple 2fa? Overview: This article describes on how to configure Google 2FA, YubiKey, and DUO Security together in the web panel, enabling SSH jump host users to authenticate using their preferred method, and providing flexibility if... Read More

Access Keyword 2FA explained

How to enable/disable Access Keyword 2FA (Two-factor Authentication) in Ezeelogin? Overview: This article provides step by step instructions for Ezeelogin gateway users to enable or disable and reset access keyword two-factor authentication (2FA).... Read More

Encryption Technologies used in Ezeelogin

What are the Encryption algorithms used in Ezeelogin? Overview: This article outlines the encryption technologies used for Ezeelogin SSH gateway users. The user passwords and security codes stored in the Ezeelogin database use multiple rounds... Read More

View users in a specific user group

How to view users in a specific user group? You can utilize the search button to display members belonging to a particular user group. Choose User Group from the dropdown menu and enter the specific user group's name to locate members belonging... Read More

Deleting entries in the mysql database table gwactivity_logs

Removing entries in the Ezeelogin database table gwactivity_logs for house keeping. Overview: This article explains how to delete entries from ’gwactivity_logs’ table. It would be required to reduce the size of the Ezeelogin MySQL... Read More

Restricting users to specific folders via SFTP

How to Restrict SFTP Connections to Specific Ports? SFTP, or Secure File Transfer Protocol, is a subsystem of SSH used for securely accessing, managing, and transferring large files of data. Chroot or change root is a security feature that restricts... Read More

Cloudflare ZTNA for securing SSH access to endpoint devices

Setup Cloudflare ZTNA (Zero Trust Network Access) with Ezeelogin for securing SSH access  Cloudflare Tunnel can also route applications through a public hostname, allowing users to connect to an SSH server with Cloudflared access. This method... Read More