Skip to Content

 Security Compliances

How to secure SSH jump server / SSH bastion host / SSH gateway

What is an SSH Bastion Host?    An SSH Bastion host is simply a single, hardened server that you “jump” through in order to access other servers or devices on the inner network. it’s simply a server that all of your users can log into... Read More

Can I use Google 2FA, Yubikey , DUO simultaneously?

Can we use multiple 2fa? Overview: This guide describes how to configure Google 2FA, YubiKey, and DUO Security together in the web panel, enabling SSH jump host users to authenticate using their preferred method, and providing flexibility if one... Read More

Access Keyword 2FA explained

How to enable/disable Access Keyword 2FA (Two-factor Authentication) in Ezeelogin? Overview: This article provides step by step instructions for Ezeelogin gateway users to enable or disable and reset access keyword two-factor authentication (2FA).... Read More

Encryption Technologies used in Ezeelogin

What are the Encryption algorithms used in Ezeelogin? Synopsis: This article outlines the encryption technologies used for Ezeelogin SSH gateway users. The user passwords and security codes stored in the Ezeelogin database uses multiple rounds... Read More

View users in a specific user group

How to view users in a specific user group? You can utilize the search button to display members belonging to a particular user group. Choose User Group from the dropdown menu and enter the specific user group's name to locate members belonging... Read More

Restricting users to specific folders via SFTP

How to Restrict SFTP Connections to Specific Ports? SFTP, or Secure File Transfer Protocol, is a subsystem of SSH used for securely accessing, managing, and transferring large files of data. Chroot or change root is a security feature that restricts... Read More

Cloudflare ZTNA for securing SSH access to endpoint devices

Setup Cloudflare ZTNA (Zero Trust Network Access) with Ezeelogin for securing SSH access  Cloudflare Tunnel can also route applications through a public hostname, allowing users to connect to an SSH server with Cloudflared access. This method... Read More