With Linux®dominating the data center infrastructure market, sysadmins, DevOps engineers, and IT admins are seeking out remote Linux management tools to make it easier to control and secure their infrastructure. With a significant number of applications run on remote servers, it is crucial to be able to manage who can gain access to those applications and data. Just as managing the infrastructure itself is greatly important, sysadmins need to be able to provision and deprovision user access to resources as necessary.
Remote Linux Management: Servers and Users
While many are leveraging configuration management and automation tools such as Chef™, Puppet, Ansible®, Salt®, and others, some functions are not accomplished as well with those tools as with other remote Linux management solutions. Where the four aforementioned solutions struggle, in specific, is with identity and access control to remote Linux servers. So while Chef, Puppet, Ansible, and Salt are great for some configuration management and server automation tasks, they don’t fare as well when they’re charged with managing identity and access control to remote Linux systems. For that, you’re going to need to consider a different type of tool. That is, a solution that can help you to manage identities (and their differing forms of authentication) and access to remote Linux servers.
SSH Keys and IaaS Providers
AWS and other infrastructure-as-a-service (IaaS) providers are now mandating the use of SSH keys to access Linux virtual machines (VMs). The overhead of SSH key management can provide a daunting challenge to organizations with many users and servers, therefore many SSH keys to manage. For growing companies with many new users and increasing remote users, SSH key management can also prove challenging. As a result, automating this task is at the forefront of many sysadmins’ wish lists. But, it’s not the only ability that sysadmins wish they had. They’re also looking to provide extra protection by leveraging multi-factor authentication (MFA) into their critical Linux servers. Efficiently accomplishing these tasks and managing the identity management function for Linux servers can be difficult with the tools sysadmins currently have at (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Ryan Squires. Read the original post at: https://jumpcloud.com/blog/remote-linux-management