-
Notifications
You must be signed in to change notification settings - Fork 72
Home
This pattern lead to "SSH recording" solutions that tries to log user activity on the endpoints (Linux servers), and push the logs to a centralized logging server, but IMHO there is a problem in this approach, in most cases a subset of the users have root access on the Linux servers, hence they may have the ability to :
- Manipulate the logging .
- Route logged traffic to different server .
- Stop logging all together .
Aker tries to address the SSH recording needs and challenges in a different way. By adding SSH gateways to guard your environment as a central location to capture, maintain and audit your SSH sessions .
You get the idea, right ?
Users on Aker SSH gateway have no super root powers nor a bash shell, instead they get an intuitive text based window, listing the servers they are allowed to access .
With ongoing development of Aker we will try to make it as friction-less as it can be.
## What Is The Flowchart Of Aker?Aker has a simple flowchart - so far - the authentication and authorization part is relayed securely to the Identity provider. Right now the work is ongoing to integrate with FreeIPA .