All posts

What Arista Eclipse actually does and when to use it

You just wanted to audit a network change, not excavate a minefield of configs and logs. Yet here you are, tracing identity through multiple layers of access proxies, wondering who approved what and when. Arista Eclipse was built to end that kind of guesswork. Arista Eclipse combines network visibility with automated access control. It gives engineers the context to see who touched which port, server, or container, and why. Instead of juggling CLI sessions and ticket systems, you get access tha

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You just wanted to audit a network change, not excavate a minefield of configs and logs. Yet here you are, tracing identity through multiple layers of access proxies, wondering who approved what and when. Arista Eclipse was built to end that kind of guesswork.

Arista Eclipse combines network visibility with automated access control. It gives engineers the context to see who touched which port, server, or container, and why. Instead of juggling CLI sessions and ticket systems, you get access that knows who you are, what you’re allowed to do, and how to record it. It’s network automation with an identity backbone.

Think of it as controlled transparency. Eclipse hooks into existing identity providers like Okta or Azure AD, maps those identities to network functions, and enforces policies across switches, routers, and cloud edges. You can line up roles from AWS IAM, match them with Eclipse permissions, and build audit logs that actually tell a story instead of dumping raw data. When done right, Eclipse turns network operations into a traceable, repeatable workflow.

The logic is simple. You define who can access what, Eclipse enforces it, and audits capture every request. Approvals and revocations become structured events, not scattered emails. The outcome is a network that self-documents and self-defends.

Here’s how the flow works in practice. A user requests temporary device access. The request references identity from your SSO provider. Arista Eclipse applies the matching role and policy. Logging and monitoring tools record the session and relay metadata to your SIEM. No static credentials, no hidden privileges, no mystery who changed VLAN settings at 3 a.m.

Best practices to keep in mind

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Use least-privilege roles mapped directly to organizational sources of truth.
  • Rotate service tokens and keys through existing secret stores.
  • Keep audit pipelines immutable using standardized logs like JSON or syslog.
  • Validate session approvals through your existing workflow automation tools.

Benefits

  • Faster access approvals with automated context inheritance.
  • Cleaner, SOC 2–ready audit trails.
  • Reduced lateral movement risk through identity-aware enforcement.
  • Simpler onboarding with SSO-based provisioning.
  • Fewer manual tickets and less time spent correlating logs.

When combined with modern developer environments, Eclipse shortens the feedback loop. Engineers do not wait half a day for approval signatures; they trigger temporary access that expires on its own. It makes secure work actually faster, which is rare. Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically, bridging human requests with system-level enforcement.

AI-assisted operators can feed into this model too. Copilots pull just-in-time credentials or propose rule updates, but Eclipse provides the verification layer that prevents accidental overreach. Your automation remains intelligent, not reckless.

How is Arista Eclipse different from a basic network controller?
It unifies identity and enforcement. A controller routes traffic. Eclipse adds who, what, and why to that path, so you get complete accountability built into every session.

When should you deploy Arista Eclipse?
Use it when your network spans multiple clouds or when teams share devices and access boundaries blur. It brings one consistent rulebook across hybrid or remote environments.

The bottom line: Arista Eclipse transforms network access from a manual judgment call into a verifiable system behavior. It’s the difference between hoping compliance holds and proving it does.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts