Tag Archives: SSH management

SSH Management With BoKS ServerControl Software

ssh management, server control, boksSSH Management has been in the press a lot the last 2 years.

Sponsored reports from analysts have focused on poor key and SSH management practices, a highly speculative assertion that Edward Snowden somehow used keys to gain access to systems (which he denies), and now the US NIST has published a document that, among other things, puts a focus on ‘automated authentication’ used for application-to-application (app2app) or system-to-system/computer-to-computer (c2c) communications.

NIST now recommends that the same level of focus and account management that has been recommended for year for interactive (people) accounts be placed on these automated accounts. Continue reading

SSH Webinar: Control Your SSH..IT

Thank you for watching the second webinar installment: “Control Your SSH..IT”

We hope that you found the presentation educational, and look forward to your feedback and questions.

View Session 1: The SSH..IT Storm
View Session 2: Oh SSH..IT, Now What?!

You may also be interested in: Taming the Beast – SSH for Security and Compliance

system security, identity access management, foxt, active directoryFoxT Access Management & Governance solutions complement your existing technologies by adding granular control and enforcement of authentication and authorization policies for both privileged and end users. www.foxt.com/boks

SSH Webinar: Oh SSH..IT, Now What!

Thank you for watching the second webinar installment: “Oh SSH..IT, Now What?”

We hope that you found the presentation educational, and look forward to your attendance and participation next week.

Webinar Reminder:
Control Your SSH..IT
Thursday October 16th, 2014 | 10am PDT/1pm EDT

  • The “what” of SSH; what SSH services an account is allowed to use, and what they can do once granted access
  • Adding privilege management as an incorporated control measure

You may also be interested in: Taming the Beast – SSH for Security and Compliance

system security, identity access management, foxt, active directoryFoxT Access Management & Governance solutions complement your existing technologies by adding granular control and enforcement of authentication and authorization policies for both privileged and end users. www.foxt.com/boks

SSH Webinar: The SSH..IT Storm

Thank you for joining us for the first installment of our 3-part webinar series on SSH. Below are your questions answered.

QUESTION:
Re: key management. If keys and logging is configured correctly, ssh/pka is multi-factor authentication which is invariably “better” than single factor authentication. It sounds like foxit’s stance is pointed more towards single factor auth to privileged accounts. Is that accurate and, if so, how is that justified?

ANSWER:
FoxT absolutely does not recommend passwords, or another single-factor authentication, as the preferred method of authentication. A key aspect that we were attempting to draw out is that in locally configured and controlled SSH deployments, and with many products that offer SSH access control, the decisions on how SSH is controlled are globally applied. FoxT believes, and the BoKS ServerControl product provides, a much more granular solution to SSH access control than what was discussed in the initial presentation, which was intended to draw out the deficiencies in many SSH implementations. Continue reading