How to make an SSH connection via Terminal Proxy

Prev Next

This document provides information about a step-by-step guide on how to make an SSH connection via Terminal Proxy.

Requirements

  • Have a command prompt-type application installed on the machine.

SSH connection

To make an SSH connection to a device that has this connectivity linked to a valid credential, you’ll need to run the command ssh followed by the credential and device as is done in a standard SSH connection. Follow the steps below:

String Description
Segura_user Username used to access the vault.
Segura_vault Hostname or IP address of the Segura to be accessed.
tenant_name Name of the tenant to be accessed.
credential User of the credential you want to use for access.
target_device and IP Hostname or IP address of the device you want to access.
  1. Open the command prompt app of your preference.
  2. Enter the following command to enter the vault:
    1. ssh Segura_user@Segura_vault
      Info

      The Segura_user field is the username used to access the vault. The Segura_vault field can be the hostname or IP address of the vault to be accessed.

    2. Press the Enter key.
    Info

    When accessing the device for the first time, a reliability warning will be displayed, type yes and press the Enter key. The warning will no longer be displayed the next time this device is accessed.

  3. Enter your password.
    1. Press the Enter key.
      Attention

      When your password is reset or expires, the terminal will display a message warning that the password needs to be changed and display the steps that the user must take to register a new password through the web interface.

  4. The Segura shell home screen will be displayed.
  5. Type list so that the list of available credentials and devices is displayed.
    Info

    If you already know the credential (username) and the device (hostname or IP) that you want to access, it’s not necessary to use the command list.

  6. After choosing, type:
    1. ssh credencial@target_device.
    2. Press the Enter key.

After these steps, the connection via SSH to a device is ready for use.


Access using SSH key

There is also the possibility of accessing with SSH keys, using the following syntax according to the desired access, replacing the strings with the values ​​described in the table below.

Info

To learn how to configure SSH keys, access the documents on this topic available at SSH Keys.

String Description
ssh_key_name Name of the credential registered via SSH key.
Segura_vault Hostname or IP address of the Segura vault.
target_device Hostname or IP address of the device you want to access.

Instance access:

ssh ssh_key_name@Segura_vault

Access to another device:

Attention

When accessing another device with an SSH key, always use the word key\.

ssh key\ssh_key_name@target_device

Access to another device or when a key and credential have the same name.

ssh key\ssh_key_name@target_device

Attention

Depending on the operating system used, the use of the backslash ( \ ) is necessary for the command to work correctly.

To access the target device in applications that don’t provide interactive prompts or if you don’t want to go through the Segura shell screen, use the Multihop. Access the specific documentation to learn how to make this type of connection.


Typing input anonymization

To enable anonymization for 30 seconds during the session, follow the steps below:

  1. With the Terminal Proxy session started, type:

    1. ./ssctl -n
  2. Press Enter.

  3. A message will appear indicating that the function has been enabled and will remain active for 30 seconds.

Use the session normally during these 30 seconds, any text you type will be displayed as asterisks in the session’s text log.
After the 30-second period, you can repeat the process to enable the function again.


Do you still have questions? Reach out to the Segura Community.