SSH Gate Overview

Command execution is made possible by the Secure Shell (SSH) protocol, which enables safe connections to distant containers. Because these SSH commands are encrypted, the connection is safe. Passwords are encrypted for further protection, and a digital certificate is used to authenticate the client/server relationship.

SSH Gate, a new component, was introduced into the basic infrastructure of the platform to enable SSH access. Through the use of an internal network, SSH Gate manages incoming user connections from the internet and routes them to the relevant container.

There Are Two Steps Involved In The Ssh Gate Authentication Process

  1. External authentication: involves connecting to the SSH Gate from the end user.
  2. Internal authentication: the user’s container is connected to the SSH Gate.

Public/private Key Pairs And The Standard Ssh Protocol Are Used In Both Authentication Steps.
SSH Protocol

You may easily access your full account using SSH Gate. You may now use an interactive menu to travel between your environments and containers without re-authenticating.

SSH Gate

Using extra tools (like Capistrano) or the SFTP and FISH protocols, you can directly access individual containers while working remotely.

SSH Proxy

Through SSH, a user can access containers and obtain the required permissions. They can also utilize sudo commands, such as these (among others), to administer the primary services.

  • sudo systemctl start jetty
  • sudo systemctl stop mysql
  • sudo systemctl restart tomcat
  • sudo systemctl status memcached
  • sudo systemctl reload mongod

We also support Secure File Transfer Protocol (SFTP) by handling SFTP connections with a threaded daemon. This ensures data security by enabling you to view, manage, and transfer files straight to the container over the SSH gate.

We now offer the secure network protocol FISH (Files transmitted over Shell protocol). Numerous well-known file managers and FTP programs, like Midnight FISH is supported by Commander, Konqueror, lftp, and Krusader. It makes it possible to maintain and access a container’s file system securely.