SSH and Secret Server

Secret Server provides robust SSH management capabilities, including SSH proxy, command restrictions, terminal administration, and jumpbox routes. The SSH proxy feature routes SSH sessions through Secret Server, ensuring secure and monitored access to endpoints. Command restrictions allow administrators to define and enforce specific commands that users can execute during SSH sessions, enhancing security and compliance. The SSH terminal administration feature enables users to connect to Secret Server via SSH, view and launch secrets, and utilize custom command menus with session recording capabilities. Additionally, SSH jumpbox routes facilitate secure access to internal systems by routing connections through one or more intermediary servers, known as jumpboxes or bastion hosts, which are hardened and monitored to reduce security risks.