Proxy an SSH Server to remote hosts in your private network.
hoop connect <connection-name>
.Feature | Native | One Off | Description |
---|---|---|---|
Audit | The gateway store and audit the commands being issued by the SSH client. | ||
Data Masking (Google DLP) | A policy can be enabled to mask sensitive fields dynamically for the output. | ||
Data Masking (MS Presidio) | A policy can be enabled to mask sensitive fields dynamically for the output. | ||
Credentials Offload | The user authenticates via SSO instead of using SSH credentials. |
Name | Type | Required | Description |
---|---|---|---|
HOST | env-var | yes | The IP or hostname of the SSH server |
PORT | env-var | no | The port of the SSH server, default to 22 |
USER | env-var | yes | The username of the Linux server |
PASS | env-var | no | The credentials of the username if password authentication is enabled in the SSH server. |
AUTHORIZED_SERVER_KEYS | env-var | no | The private key of the user that corresponds to the public key at $HOME/<user>/.ssh/authorized_keys |
ssh
client to connect it.
--port
flag.
PKCS#8
format and encoded as base64. You can generate a key with openssl
utility:
SSH_CLIENT_HOST_KEY=<base64-encoded-key>
--debug
flag when running the hoop connect
command.
This will provide detailed information about the connection process, including any issues related to parsing the host key.