SSH Jump Server loved by the Enterprises.

Swiss knife for Devops engineers and Linux system administrators.

What is ezeelogin?

Secure SSH access to Linux servers, Routers, Switches & more.

A  SSH Jump Server solution( SSH Jump box) to secure ssh access of  your employees  to  Linux servers/ devices, Routers , Switches , Cloud instances & to meet security compliances.  It acts as a centralized SSH login server where system admins, devops users would login first to access other hosts behind it. It has features like  pam ( privileged access management),  password management,  ssh session recording, role based access control, multi factor authentication, rdp access for window machines , rdp session recording and more.

jump host

Why do you need a SSH Jump Server?

With a SSH Jump server, you can now securely  manage and administer Linux servers, Routers, Switches,  AWS  instances, cloud containers, Window hosts behind the jump server, easily, efficiently and very securely. The jump server  features such as Parallel Shell, SSH Key management , Role based access control in ssh, ssh session recording, multi factor authentication would save you thousands of hours in time and help you meet various security compliances such as PCI DSS ,HIPPA, ISO 27001, GDPR ,NIST, NERC,FFIEC and more.

How secure is the Jump server?

Military grade encryptions used

Security is of paramount importance. Latest encryption technologies such as sha256, SHA256, BLOWFISH or DES, AES have been used to ensure that the jumpbox is indeed a unbreakable fortress. We have made sure that your remote servers / instances  are not compromised even if somebody get root access to the jump server.

jump server security
jump server interface for ssh

Interface for fast SSH access.

Secure and Quick SSH access to multiple linux servers

The jump box has an intuitive ssh interface that let you quickly navigate to remote hosts  that you have access to. You can search for the remote hosts based on their hostname, ip address or other tags assigned to it.

Access your server information quickly

Server information at your fingertips

You can now access server details such as root password, server ip,SSH port number, hardware information such as cpu, ram, motherboard, hardrive, raid , Rack id,data center details, kvm information with a single key press…

Parallel Shell

Execute commands on multiple linux servers

Parallel shell allows quick and easy execution of commands on multiple linux servers of your choice simultaneously.This would save you lot of costly system administration hours. Now run commands on multiple linux servers with the ease and speed of doing on one server…

Record SSH Session

Monitor & record your staff activities in SSH

Recording ssh sessions of your devops engineers , system administrators or developers is now just a click away. Various security compliance such as pci dss, hippa, sox , soc2, ffiec, nerc requires you to maintain the ssh logs for forensic audits. The intuitive interface lets you search through the complete ssh recordings of the user. Also, you can watch the users ssh activities in real time as well.

record ssh session
two factor authentication

2 Factor Authentication in SSH

Google Authenticator, Yubikey, DUO Security supported

The ssh interface and the gui is now fortified with multi factor authentication mechanism such as Google Authenticator, Yubikey and DUO Security to ensure that access to your Linux containers are bullet proof. This help in meeting compliance like PCI, ISO 27001 and more.

Supports SAML for SSO (Single Sign On)

Integrates with Okta, OneLogin, Microsoft Azure SSO & more.

Supports Single sign-on (SSO)  authentication and integrates with IdP providers such Okta, OneLogin , Microsoft Azure SSO & more. Users  can securely authenticate into the web application gui along with other multiple applications and websites by using just one set of credentials.

single sign on ssh jump server

Role Based Access Control (RBAC)

Active Directory, LDAP, SAML Authentication supported

Role based Access control to decide which ssh users gets access to which servers and as what users. This is important as users with root access can do anything. This is also called Privileged Access Management. This is an important   requirement for meeting compliances like PCI DSS, ISO 27001 and much more.

access control

One click RDP & Record RDP sessions

Login using inbuilt RDP client into remote windows machines with a single click and record the RDP sessions initiated by your systems administrators  and devops engineers.  This feature helps you meet various security compliances such as pci dss 3.2,  ISO 27001, gdpr,ffiec, sox, soc2, nist, nerc, mas and much more. 

Join over 1,000 + companies that trust us.

Try it yourself 30 days free. No credit card required!

Try 30 days free trial