Grant contractors and third-party vendors temporary SSH access to Linux servers with automatic expiration. No SSH keys to distribute, share, or clean up. Identity-verified, MFA-protected, fully recorded SSH sessions. Revoke access instantly when the engagement ends.
Why Contractor SSH Access Is a Security Challenge
Granting SSH access to contractors, vendors, MSPs, and temporary workers is one of the most challenging access management problems in enterprise IT. Traditional approaches require distributing SSH keys to external parties, creating local accounts on servers, and manually revoking access when engagements end. Keys are often shared among contractor team members, stored in insecure locations, and forgotten in authorized_keys files long after the contractor has left. OnePAM solves contractor SSH access with identity-based temporary access. Contractors authenticate via your corporate IdP (you can add them as external users in Okta, Azure AD, or Google Workspace) or via their own organization's IdP through federated authentication. OnePAM issues short-lived certificates with configurable expiration tied to the engagement period. All contractor SSH sessions are recorded and tied to individual identities. When the engagement ends, disable the contractor in your IdP and access stops immediately — no server-by-server key cleanup.
Gateway SSH Proxy
Ideal for contractor access. Contractors SSH through the gateway — no agent installation on your servers. Gateway handles authentication, recording, and access expiration. Contractors never have direct server access.
Local Agent
Suitable when contractors need direct SSH access. The agent authenticates contractors via IdP and issues time-limited certificates. Access policies restrict which servers contractors can reach.
Risks of Contractor SSH Access
Without identity-based SSH access, these risks threaten your servers every day.
SSH Security Challenges
These are the risks organizations face with traditional SSH authentication.
Key Distribution
Distributing SSH keys to contractors securely is difficult. Keys are often sent via email, Slack, or shared drives — all insecure channels that create uncontrolled copies.
Shared Keys
Multiple contractors from the same vendor share a single SSH key. When one person leaves the vendor, the key must be rotated for everyone. It rarely is.
Access Lingering
When contracts end, SSH keys must be removed from every server the contractor accessed. This cleanup is manual, incomplete, and often forgotten entirely.
No Individual Accountability
Shared SSH keys make it impossible to determine which contractor performed a specific action. Audit trails show a key fingerprint, not a person.
No Session Visibility
Contractor SSH sessions are not recorded. If a contractor causes damage (intentional or accidental), there's no evidence of what they did.
Compliance Exposure
SOC 2, HIPAA, and PCI DSS require controlled third-party access with audit trails. Unmanaged contractor SSH keys create compliance violations.
How OnePAM Manages Contractor SSH Access
Step-by-step guide to deploying identity-based SSH access.
Add Contractor to IdP
Add the contractor as an external user in your IdP (Okta, Azure AD, Google Workspace) or configure federated authentication.
Create Time-Limited Access Policy
Define a OnePAM access policy for the contractor: which servers, what privilege level, for how long.
Contractor SSHs via OnePAM
Contractor authenticates via IdP, completes MFA, and SSH session begins. No SSH keys needed.
Sessions Are Recorded
Every contractor SSH session is recorded with identity verification. Keystroke-by-keystroke capture.
Access Expires Automatically
When the engagement period ends, access stops. No manual cleanup. Disable contractor in IdP for immediate revocation.
Benefits of Identity-Based Contractor Access
What changes when you deploy identity-based SSH access.
Zero Key Distribution
No SSH keys to distribute, share, or manage. Contractors authenticate via IdP and get temporary certificates.
Zero SSH keys to distributeAutomatic Expiration
Contractor access expires automatically based on engagement dates. No manual cleanup, no forgotten keys.
Auto-expiring contractor accessIndividual Accountability
Every contractor has their own identity and their own session recordings. Know exactly who did what.
100% individual attributionFull Session Recording
All contractor sessions are recorded. Review, search, and replay sessions for quality assurance and security.
Every session recordedInstant Revocation
End an engagement early? Disable the contractor in your IdP. SSH access stops immediately across all servers.
Instant access revocationCompliance-Ready
Third-party access with identity verification, MFA, session recording, and automatic expiration satisfies SOC 2, HIPAA, and PCI DSS.
Audit-ready third-party accessSSH SSO Capabilities
Every feature needed for enterprise-grade SSH authentication.
Zero-Day Protection Features
Enterprise-grade security controls for SSH access.
Contractor SSH Access Use Cases
Common scenarios where organizations deploy OnePAM SSH SSO.
SSH Access for Contractors & Third Parties FAQ
Common questions about SSH SSO and zero-day protection.
How do contractors authenticate without SSH keys?
Can I restrict contractors to specific servers and commands?
What happens when a contractor's engagement ends?
Can contractors use their own organization's IdP?
Are contractor sessions always recorded?
Can I require approval for contractor SSH access?
Manage Contractor SSH Access
Time-limited, identity-verified, fully recorded SSH sessions for third parties.