Secure SSH Access
VSAY Terminal provides enterprise-grade secure SSH access to your machines through encrypted tunnels, ensuring your connections are protected at all times.
How It Works
VSAY Terminal acts as a secure gateway between you and your servers:
User Browser → VSAY Terminal Gateway → Your Server
| | |
Encrypted Verified SSH Protocol
Connection & Logged (Encrypted)
All connections are:
- End-to-end encrypted using industry-standard protocols
- Authenticated against your organization's identity provider
- Authorized based on your role and permissions
- Logged for audit and compliance purposes
Connection Methods
Direct Connection
Connect directly to machines that are accessible from the VSAY Terminal gateway:
- Register the machine with its public IP or hostname
- Configure SSH authentication (key-based recommended)
- Connect through the Web Terminal
Jump Host / Bastion
For machines in private networks, configure a jump host:
- Register your bastion/jump host first
- When adding a private machine, specify the jump host
- VSAY Terminal will route the connection through the bastion
Authentication Options
SSH Key Authentication (Recommended)
SSH keys provide the most secure authentication method:
-
Navigate to Settings → SSH Keys
-
Click "Add SSH Key"
-
Either:
- Generate a new key pair - VSAY Terminal will generate and store the private key securely
- Upload an existing public key - If you manage your own private keys
-
Add the public key to your server's
~/.ssh/authorized_keys
Password Authentication
If SSH keys aren't an option:
- When adding a machine, select "Password Authentication"
- Enter the username and password
- Credentials are encrypted and stored securely
Password authentication is less secure than SSH keys. We recommend using SSH key authentication whenever possible.
Security Features
Connection Encryption
All connections use:
- TLS 1.3 for browser-to-gateway communication
- SSH protocol for gateway-to-server communication
- AES-256 encryption for data at rest
Session Management
- Session timeout: Configurable inactivity timeout
- Concurrent session limits: Limit how many sessions a user can have
- Session recording: Optional recording of all terminal sessions
IP Whitelisting
Restrict access to specific IP addresses or ranges:
- Go to Organization Settings → Security
- Enable IP Whitelisting
- Add allowed IP addresses or CIDR ranges
Best Practices
- Use SSH keys instead of passwords
- Rotate keys regularly - Update SSH keys periodically
- Use jump hosts for private networks
- Enable IP whitelisting for sensitive machines
- Review audit logs regularly to detect anomalies
- Set appropriate roles - Give users only the access they need