Add SAML/OIDC SSO to SSH on Amazon Linux 2 and Amazon Linux 2023 EC2 instances. Move beyond AWS key pairs and EC2 Instance Connect. Deploy via local agent or gateway SSH proxy. Shield EC2 instances from SSH zero-day vulnerabilities.
Get Started in Minutes
Install the OnePAM agent with a single command. No packages to download, no repositories to configure.
Why EC2 Instances Need More Than AWS Key Pairs
Amazon Linux is the default OS for AWS EC2 instances, optimized for the AWS ecosystem. SSH access to Amazon Linux EC2 instances typically uses AWS key pairs — static SSH keys tied to AWS IAM users, not corporate identities. EC2 Instance Connect and AWS Systems Manager Session Manager provide alternatives, but they lack SAML/OIDC integration, cross-cloud consistency, and the session recording capabilities that compliance frameworks require. OnePAM bridges AWS EC2 SSH access with your corporate Identity Provider. The local agent installs on Amazon Linux 2 and AL2023 instances with a single command. The gateway SSH proxy authenticates SSH connections to EC2 instances without requiring agent installation — ideal for auto-scaling groups, spot instances, and Lambda-managed fleets. OnePAM eliminates AWS key pair management, enforces corporate MFA on every SSH session, and provides compliance-ready audit trails that AWS CloudTrail alone cannot deliver.
Local Agent
Install with a single command on Amazon Linux 2 and AL2023 EC2 instances. Deploy via user-data scripts or AMI baking. Auto-scaling compatible.
Gateway SSH Proxy
Run OnePAM gateway in a dedicated VPC/subnet. Proxy SSH to EC2 instances across VPCs, regions, and accounts. No agent needed on target instances. Works with spot instances and auto-scaling.
SSH Security Gaps on Amazon Linux EC2
Without identity-based SSH access, these risks threaten your servers every day.
SSH Security Challenges
These are the risks organizations face with traditional SSH authentication.
AWS Key Pair Sprawl
Teams create key pairs per project, per developer, per environment. Hundreds of key pairs exist in IAM with no visibility into which are actively used or abandoned.
No Corporate Identity Link
AWS key pairs authenticate IAM users, not corporate identities. There's no native way to require Okta or Azure AD authentication for SSH to EC2.
Auto-Scaling Challenges
Auto-scaling groups launch instances from AMIs. SSH key management for dynamically created instances is complex — keys must be baked into AMIs or injected via user-data.
Multi-Account Complexity
Organizations with multiple AWS accounts have fragmented SSH key management. Users need different key pairs for different accounts.
Compliance Gaps
AWS CloudTrail logs API calls but not SSH session content. SOC 2 and HIPAA auditors require evidence of who accessed which server and what they did.
Spot Instance Access
Spot instances are ephemeral. Managing SSH access to short-lived instances with static key pairs is operationally wasteful and insecure.
How OnePAM Adds SSO to SSH on Amazon Linux
Step-by-step guide to deploying identity-based SSH access.
Deploy Agent or Gateway in AWS
Install agent on EC2 instances via user-data, or deploy a OnePAM gateway in your VPC.
Connect Corporate IdP
Link Okta, Azure AD, Google Workspace, or any SAML/OIDC provider — independent of AWS IAM.
Replace Key Pairs with Policies
Define access policies based on IdP groups, not AWS key pairs. Map teams to EC2 instance groups.
SSH with Corporate Credentials
Developers SSH to EC2 instances using their corporate identity. No AWS key pairs needed.
Audit Beyond CloudTrail
Session-level audit with identity context, MFA status, commands executed, and optional full recording.
Benefits of SSH SSO on Amazon Linux
What changes when you deploy identity-based SSH access.
Eliminate AWS Key Pair Management
No more creating, distributing, rotating, or revoking AWS key pairs. Corporate identity replaces static keys.
Zero AWS key pairs to manageAuto-Scaling Compatible
OnePAM certificates work with auto-scaling groups. New instances automatically accept OnePAM-authenticated connections.
Works with dynamic infrastructureMulti-Account SSH Unification
One identity, one MFA policy, one audit trail across all AWS accounts. No per-account key pair management.
Unified access across AWS accountsBeyond CloudTrail for SSH
Session-level logging with keystroke recording. See what users did inside SSH sessions, not just that they connected.
Complete session visibilitySpot Instance Ready
Short-lived certificates match the ephemeral nature of spot instances. No key management overhead for temporary compute.
Zero overhead for ephemeral instancesCross-Cloud Consistency
Same SSH authentication for Amazon Linux, Azure VMs, and GCP instances. One identity layer across all clouds.
Multi-cloud SSH consistencySSH SSO Capabilities
Every feature needed for enterprise-grade SSH authentication.
Zero-Day Protection Features
Enterprise-grade security controls for SSH access.
Amazon Linux SSH SSO Use Cases
Common scenarios where organizations deploy OnePAM SSH SSO.
SSO for SSH on Amazon Linux FAQ
Common questions about SSH SSO and zero-day protection.
How does OnePAM differ from EC2 Instance Connect?
Can OnePAM work with auto-scaling groups?
Does OnePAM replace AWS Systems Manager Session Manager?
How does OnePAM handle SSH to instances in private subnets?
Can I deploy OnePAM across multiple AWS accounts?
What happens to my existing AWS key pairs?
Replace AWS Key Pairs with Corporate SSO
Add SAML/OIDC to SSH on Amazon Linux EC2.