Add SAML/OIDC SSO to SSH on SUSE Linux Enterprise Server. Replace SSH keys with identity-based access for SAP HANA, HPC, and enterprise workloads. Deploy via local agent or gateway SSH proxy. Protect SLES servers from SSH zero-day vulnerabilities.
Get Started in Minutes
Install the OnePAM agent with a single command. No packages to download, no repositories to configure.
Why SLES Servers Need Identity-Based SSH Access
SUSE Linux Enterprise Server (SLES) is the platform of choice for SAP HANA, high-performance computing, and enterprise workloads in regulated industries. SLES servers run mission-critical systems that require the highest levels of access control, audit compliance, and security. SSH access to SLES servers typically relies on SSH keys managed through SUSE Manager or manual distribution. OnePAM adds SAML/OIDC SSO to SSH on SLES without disrupting existing SUSE Manager workflows. The local agent installs with a single command. The gateway SSH proxy protects SLES servers (including SLES 12 in LTSS) without requiring any software installation. OnePAM is particularly valuable for SAP environments where privileged SSH access to HANA database servers must be identity-verified, MFA-protected, and fully audited for SOX, GDPR, and industry-specific compliance.
Local Agent
Install with a single command on SLES 12 and later. AppArmor-compatible. Compatible with SUSE Manager. Designed for SAP HANA and enterprise workloads.
Gateway SSH Proxy
Proxy SSH connections to SLES servers without agent installation. Gateway shields outdated OpenSSH from exploitation. Ideal for SAP environments, deprecated SLES 11 and earlier releases without systemd, and servers where agent installation is not permitted.
SSH Security Risks on SUSE Linux Enterprise
Without identity-based SSH access, these risks threaten your servers every day.
SSH Security Challenges
These are the risks organizations face with traditional SSH authentication.
SAP Change Control
SLES servers running SAP HANA have rigid change control processes. SSH security patches take weeks to test and deploy. During the gap, servers are vulnerable.
Privileged SAP Access
DBAs and SAP Basis administrators need SSH access to HANA servers. This access must be identity-verified and audited for SOX and GDPR compliance.
SUSE Manager Limitations
SUSE Manager distributes SSH keys and manages configurations but lacks SAML/OIDC integration, MFA enforcement, and session recording.
HPC Cluster Scale
SLES-based HPC clusters have hundreds or thousands of nodes. SSH key management at this scale is operationally prohibitive.
SLES 12 LTSS Security
SLES 12 LTSS servers receive limited security patches. SSH zero-day vulnerabilities may remain unpatched in production environments.
Multi-Tier SAP Landscapes
SAP landscapes span dev, QA, and production tiers. SSH access policies must differ by tier with escalating security requirements.
How OnePAM Adds SSO to SSH on SLES
Step-by-step guide to deploying identity-based SSH access.
Deploy Agent or Gateway
Install the agent on SLES 12+, or use gateway for agentless protection in SAP-critical environments.
Connect Corporate IdP
Integrate Okta, Azure AD, SAP Cloud Identity, or any SAML/OIDC provider.
Map SAP Roles to SSH Access
Define SSH access policies based on SAP roles and IdP groups. Different access for Basis, DBA, and developer roles.
SSH with Corporate Identity
SAP administrators SSH to SLES servers authenticated by their corporate IdP. Short-lived certificates replace static keys.
Audit for SOX and GDPR
Every SSH session to SAP/SLES servers is logged with identity, MFA method, and optional full session recording.
Benefits of SSH SSO on SLES
What changes when you deploy identity-based SSH access.
SAP-Grade Security
Identity-verified, MFA-protected SSH access to SLES servers running SAP HANA. Meets SAP security best practices and audit requirements.
Enterprise SAP security controlsProtect SLES 12 LTSS
Gateway mode shields SLES 12 servers in LTSS from SSH exploits without requiring OS upgrades that would disrupt SAP systems.
Zero-day protection for SLES 12SUSE Manager Compatible
OnePAM works alongside SUSE Manager. Use Manager for system management, OnePAM for identity-based SSH access.
Complements existing SUSE toolingHPC Scale
Manage SSH access to hundreds of HPC compute nodes with IdP-based policies. Scale to thousands of SLES nodes.
Scale to 1000+ nodesSOX/GDPR Compliance
Identity-verified access logs, session recordings, and access reviews satisfy SOX and GDPR requirements for SAP system access.
Regulatory compliance built-inMulti-Tier SAP Policies
Different access policies for dev, QA, and production SAP tiers. Escalating MFA and recording requirements by environment.
Tier-based access controlSSH SSO Capabilities
Every feature needed for enterprise-grade SSH authentication.
Zero-Day Protection Features
Enterprise-grade security controls for SSH access.
SLES SSH SSO Use Cases
Common scenarios where organizations deploy OnePAM SSH SSO.
SSO for SSH on SUSE Linux Enterprise FAQ
Common questions about SSH SSO and zero-day protection.
Does OnePAM support SAP Cloud Identity Services as an IdP?
Is the OnePAM agent compatible with SLES AppArmor?
Can OnePAM protect SLES 12 servers in LTSS?
How does OnePAM integrate with SUSE Manager?
Can OnePAM manage SSH access to SAP HANA servers with different privilege levels?
Does OnePAM support SLES on IBM Power (ppc64le)?
Add SSO to SSH on SUSE Linux Enterprise
Identity-based SSH for SAP, HPC, and enterprise SLES workloads.