The first time I needed to give a contractor SSH access to production, I felt a knot in my stomach. One wrong command, one bad key, and the day could end in disaster. I wanted an easy way to grant and revoke access, log every session, and avoid juggling endless SSH configs. That’s when I started thinking: why isn’t SSH access as simple as switching AWS CLI profiles?
AWS CLI-style profiles work because you can jump between environments with a single flag. You can run a command with --profile staging or --profile prod and know you’re in the right context. Imagine applying that same idea to SSH, through a secure proxy, without reworking your infrastructure or spreading keys across machines.
An SSH access proxy using AWS CLI-style profiles means you keep one client-side setup. No more fighting with .ssh/config files, agent forwarding, or distributing private keys. Instead, you define profiles that match your environments: --profile prod-ssh connects through the proxy to production, --profile staging-ssh routes to staging. Sessions route safely, identities switch cleanly, and you know exactly who did what, when.