SSH Access Gateway

Secure shell gateway with browser-based terminal access — no SSH ports exposed to the internet. Full terminal emulation, session recording, keystroke logging, and identity-based access controls for compliance.

Zero Trust SSH Access

Browser-based SSH with full terminal emulation
No SSH ports exposed to the internet
Identity-verified access with SSO integration
Complete keystroke logging and session recording
Role-based access controls per server or group
Just-in-time access with approval workflows
Clipboard and file transfer controls
Searchable session archives for compliance

Secure SSH Access

https://ssh.pumagate.io/prod-server-01 Secured by PumaGate john@acme.com | MFA ✓ | Recording REC Connecting to prod-server-01 via PumaGate... Identity: john@acme.com (Okta SSO) ✓ MFA verified — hardware key ✓ Session recording enabled ✓ Connected (cert valid 8h, latency 4ms) Welcome to prod-server-01 (Ubuntu 24.04 LTS) Last login: Mon Feb 7 10:34:12 2026 from pumagate-gw john@prod-server-01:~$ sudo systemctl status nginx ● nginx.service - A high performance web server Loaded: loaded (/lib/systemd/system/nginx.service; enabled) Active: active (running) since Mon 2026-02-07 10:34 Memory: 12.4M Tasks: 5 (limit: 4461) john@prod-server-01:~$
Terminal — zsh ~ $ pumagate ssh prod-server-01 ❖ PumaGate Authenticating... Opening browser for SSO login... Authenticated as john@acme.com (Okta) ✓ MFA challenge passed ✓ Short-lived certificate issued (valid 8h) ✓ Session recording started Establishing SSH tunnel... Welcome to prod-server-01 (Ubuntu 24.04 LTS) Last login: Mon Feb 7 10:34:12 2026 from pumagate-gw john@prod-server-01:~$ kubectl get pods -n prod NAME READY STATUS AGE api-server-7d4f8b6c5-x2k9p 1/1 Running 3d worker-5f9a8e7d2-m4n7q 1/1 Running 3d postgres-0 1/1 Running 7d redis-master-0 1/1 Running 7d john@prod-server-01:~$

How It Works

1. Connect Identity Provider

Integrate with Okta, Azure AD, Google Workspace, or any SAML/OIDC provider in minutes.

2. Add Resources

Register your servers, databases, and web apps. Define role-based access policies.

3. Secure Access

Users access resources through the browser with identity verification, session recording, and audit logs.

Ready for SSH Access Gateway?

Deploy in minutes. No legacy VPN required. No credit card required.