But... you can switch to Kerberos SSO, or setup smart cards login instead.
You can also use it kind of like a jump host and do ssh keys I to secondary server.
I find it cool to give nice way to access in environments where ssh is not allowed by default, but https is. It's sometimes easier to setup proxies/reverse proxies in corporate forest instead of opting for direct ash access.
Folks, private keys. Change your SSH port and use an SSH tarpit on port 22.
1. You can monitor if your private key is compromised and automatically rotate it.
2. It's fun to mess around with hackers and script kidies.
This is the first thing you should disable as soon as your public key is on the server.
You can use Cockpit Client (from flathub) to connect with SSH.
We tested it before, however it is not quite good in our case.
Most of our services are running in a K8S cluster. The servers are just something we run the K8S node.
If we need to patch the system, we just “drain” the node, update and add it back.
So, if you do not need to directly operate the server, it will not be necessary.
I'm okay with using it instead of the shell because I know how to do stuff via the shell but I just got lazy.
Yet managing the server through a web interface sounds nice.
Any feedback here?