How to secure SSH jump server ? Overview: This article defines what an SSH bastion host is and how to secure an SSH jump server. What is an SSH Bastion Host? SSH Bastion host is simply a single, hardened server that you “jump” through in... Read More
Security Compliances
How to use multiple 2fa? Overview: This article describes on how to configure Google 2FA, YubiKey, and DUO Security together in the web panel, enabling SSH jump host users to authenticate using their preferred method, and providing flexibility if... Read More
Securing SSH Session Recording to Prevent Password Capture Overview: This article describes how to configure SSH session recording to prevent password capture by setting it to "Output" mode in Ezeelogin, crucial for meeting PCI DSS, HIPPA, SOC, SOC2... Read More
How to enable/disable Access Keyword 2FA (Two-factor Authentication) in Ezeelogin? Overview: This article provides step by step instructions for Ezeelogin gateway users to enable or disable and reset access keyword two-factor authentication (2FA).... Read More
What are the Encryption algorithms used in Ezeelogin? Overview: This article outlines the encryption technologies used for Ezeelogin SSH gateway users. The user passwords and security codes stored in the Ezeelogin database use multiple rounds... Read More
How to view users in a specific user group? You can utilize the search button to display members belonging to a particular user group. Choose User Group from the dropdown menu and enter the specific user group's name to locate members belonging... Read More
Removing entries in the Ezeelogin database table gwactivity_logs for house keeping. Overview: This article explains how to delete entries from ’gwactivity_logs’ table. It would be required to reduce the size of the Ezeelogin MySQL... Read More
How can I verify the SSL/TLS, HTTPS, and SSH versions utilized in an Ezeelogin Server? By default, the latest version available on the server would be used to encrypt the communication. 1. Execute the below command to find the SSL/TLS version in... Read More
How to Restrict SFTP Connections to Specific Ports? SFTP, or Secure File Transfer Protocol, is a subsystem of SSH used for securely accessing, managing, and transferring large files of data. Chroot or change root is a security feature that restricts... Read More
Setup Cloudflare ZTNA (Zero Trust Network Access) with Ezeelogin for securing SSH access Cloudflare Tunnel can also route applications through a public hostname, allowing users to connect to an SSH server with Cloudflared access. This method... Read More