In-Process Security: Real-Time SSH Command Request & Approval
High Risk SSH Command Access Control
Key Scenarios Showcased in the Demo:
Flexible Policy Configuration: Watch how an administrator easily configures a "Command Policy" using regular expressions to identify specific high-risk keystrokes (e.g.,
passwd,systemctl, orrm -rf /) across UNIX, Linux, or network devices, setting the enforcement action to "Approve".Real-Time Command Interception: A user logs into a server via an SSH session and attempts to run the restricted command. RankEZ instantly pauses the execution in real-time and displays a direct terminal prompt: "SYSTEM: The command is waiting for the approver to confirm".
Instant Notification & Review: The designated supervisor immediately receives an email notification alerting them of the attempted action. The demo shows the supervisor logging into the RankEZ portal, navigating to their "Todo" dashboard under "Command Request", reviewing the context, and clicking "Agree".
Seamless Resumption: Back in the user's active SSH terminal, the system instantly notifies the user: "SYSTEM: The command has been approved by user [approver]!" and the command automatically resumes and executes smoothly.
The Result: Granular, real-time control over privileged sessions, ensuring that dangerous or sensitive commands are always verified by a second pair of eyes before they can impact critical data center assets.
Access the Full Resource
In-Process Security: Real-Time SSH Command Request & Approval
High Risk SSH Command Access Control
Key Scenarios Showcased in the Demo:
Flexible Policy Configuration: Watch how an administrator easily configures a "Command Policy" using regular expressions to identify specific high-risk keystrokes (e.g.,
passwd,systemctl, orrm -rf /) across UNIX, Linux, or network devices, setting the enforcement action to "Approve".Real-Time Command Interception: A user logs into a server via an SSH session and attempts to run the restricted command. RankEZ instantly pauses the execution in real-time and displays a direct terminal prompt: "SYSTEM: The command is waiting for the approver to confirm".
Instant Notification & Review: The designated supervisor immediately receives an email notification alerting them of the attempted action. The demo shows the supervisor logging into the RankEZ portal, navigating to their "Todo" dashboard under "Command Request", reviewing the context, and clicking "Agree".
Seamless Resumption: Back in the user's active SSH terminal, the system instantly notifies the user: "SYSTEM: The command has been approved by user [approver]!" and the command automatically resumes and executes smoothly.
The Result: Granular, real-time control over privileged sessions, ensuring that dangerous or sensitive commands are always verified by a second pair of eyes before they can impact critical data center assets.
Access the Full Resource
Related resources:

Demo
Deep Data Protection: Advanced Database Audit & SQL Control in RankEZ
Read more

Demo
Live Monitoring & Audi
This demo showcases how RankEZ transforms privileged access from a black box into a fully transparent, heavily audited, and controllable environment for security teams.
Read more

Demo
Frictionless & Quick SSH Access with RankEZ
Read more
