Platform

Solutions

Products

Resources

Partners

Company

In-Process Security: Real-Time SSH Command Request & Approval

In-Process Security: Real-Time SSH Command Request & Approval

In-Process Security: Real-Time SSH Command Request & Approval

High Risk SSH Command Access Control



Key Scenarios Showcased in the Demo:

  • Flexible Policy Configuration: Watch how an administrator easily configures a "Command Policy" using regular expressions to identify specific high-risk keystrokes (e.g., passwd, systemctl, or rm -rf /) across UNIX, Linux, or network devices, setting the enforcement action to "Approve".

  • Real-Time Command Interception: A user logs into a server via an SSH session and attempts to run the restricted command. RankEZ instantly pauses the execution in real-time and displays a direct terminal prompt: "SYSTEM: The command is waiting for the approver to confirm".

  • Instant Notification & Review: The designated supervisor immediately receives an email notification alerting them of the attempted action. The demo shows the supervisor logging into the RankEZ portal, navigating to their "Todo" dashboard under "Command Request", reviewing the context, and clicking "Agree".

  • Seamless Resumption: Back in the user's active SSH terminal, the system instantly notifies the user: "SYSTEM: The command has been approved by user [approver]!" and the command automatically resumes and executes smoothly.

The Result: Granular, real-time control over privileged sessions, ensuring that dangerous or sensitive commands are always verified by a second pair of eyes before they can impact critical data center assets.

Access the Full Resource

In-Process Security: Real-Time SSH Command Request & Approval

High Risk SSH Command Access Control



Key Scenarios Showcased in the Demo:

  • Flexible Policy Configuration: Watch how an administrator easily configures a "Command Policy" using regular expressions to identify specific high-risk keystrokes (e.g., passwd, systemctl, or rm -rf /) across UNIX, Linux, or network devices, setting the enforcement action to "Approve".

  • Real-Time Command Interception: A user logs into a server via an SSH session and attempts to run the restricted command. RankEZ instantly pauses the execution in real-time and displays a direct terminal prompt: "SYSTEM: The command is waiting for the approver to confirm".

  • Instant Notification & Review: The designated supervisor immediately receives an email notification alerting them of the attempted action. The demo shows the supervisor logging into the RankEZ portal, navigating to their "Todo" dashboard under "Command Request", reviewing the context, and clicking "Agree".

  • Seamless Resumption: Back in the user's active SSH terminal, the system instantly notifies the user: "SYSTEM: The command has been approved by user [approver]!" and the command automatically resumes and executes smoothly.

The Result: Granular, real-time control over privileged sessions, ensuring that dangerous or sensitive commands are always verified by a second pair of eyes before they can impact critical data center assets.

Access the Full Resource