Add SAML/OIDC Single Sign-On to SSH on Ubuntu Server. Replace SSH keys with identity-based authentication via your corporate IdP. Deploy via local agent or gateway SSH proxy. Shield unpatched Ubuntu servers from zero-day SSH vulnerabilities like regreSSHion.
Get Started in Minutes
Install the OnePAM agent with a single command. No packages to download, no repositories to configure.
Why Ubuntu Servers Need Identity-Based SSH Access
Ubuntu Server is the most popular Linux distribution for cloud and on-premises deployments, powering millions of servers on AWS, Azure, GCP, and private data centers. Yet SSH access to Ubuntu servers still relies on static SSH keys and passwords — creating key sprawl, orphan access, and zero-day exposure. OnePAM adds SAML/OIDC SSO to SSH on Ubuntu Server without modifying sshd configuration. With the local agent, OnePAM authenticates SSH sessions via your corporate IdP (Okta, Azure AD, Google Workspace). With the gateway SSH proxy, OnePAM authenticates users at the gateway and proxies SSH connections — no agent needed on the Ubuntu server itself. Both modes enforce MFA, issue short-lived certificates, record sessions, and provide compliance-ready audit trails. Ubuntu servers running outdated OpenSSH versions are shielded from zero-day exploits like regreSSHion (CVE-2024-6387) because the gateway prevents direct access to the SSH daemon.
Local Agent
Install the OnePAM agent on Ubuntu Server with a single command. Provides direct SSH access with SAML/OIDC authentication. Supports Ubuntu 16.04 LTS and later.
Gateway SSH Proxy
Run a dedicated OnePAM gateway that proxies SSH connections to Ubuntu servers. No agent installation required. Ideal for EC2 instances, auto-scaling groups, and deprecated Ubuntu releases without systemd (14.04 and earlier).
SSH Security Risks on Ubuntu Server
Without identity-based SSH access, these risks threaten your servers every day.
SSH Security Challenges
These are the risks organizations face with traditional SSH authentication.
SSH Key Sprawl
Ubuntu servers accumulate SSH keys in authorized_keys files across hundreds of user accounts. Auditing which keys belong to current employees is nearly impossible at scale.
No Native SSO
Ubuntu's OpenSSH does not natively support SAML or OIDC. Adding SSO traditionally requires complex configuration, SSSD setup, or LDAP integration that breaks on upgrades.
Orphan Access
When employees leave, their SSH keys remain on Ubuntu servers. Manual cleanup across hundreds of servers is error-prone. Former employees retain access until keys are manually removed.
No MFA for SSH
Adding MFA to SSH on Ubuntu traditionally requires configuring each server individually. Configuration drift is inevitable.
Zero-Day Exposure
Ubuntu servers running older OpenSSH versions are vulnerable to exploits like regreSSHion. Production servers cannot be patched immediately due to change control requirements.
Fragmented Audit Logs
SSH session logs are scattered across individual Ubuntu servers in /var/log/auth.log. Correlating who accessed which server requires log aggregation infrastructure.
How OnePAM Adds SSO to SSH on Ubuntu Server
Step-by-step guide to deploying identity-based SSH access.
Choose Your Deployment Mode
Select local agent installation for direct SSH access, or gateway SSH proxy for agentless protection.
Connect Your Identity Provider
Configure your corporate IdP (Okta, Azure AD, Google Workspace, OneLogin, or any SAML 2.0/OIDC provider) as the authentication source.
Define Access Policies
Set granular access rules: who can SSH to which Ubuntu servers, from where, at what times, and with what MFA requirements.
Users SSH with Corporate Identity
Developers and operators SSH to Ubuntu servers using their corporate credentials. No SSH keys to distribute, rotate, or revoke.
Audit, Record, Comply
Every SSH session is logged with full IdP context. Optional session recording captures every keystroke.
Benefits of SSH SSO on Ubuntu Server
What changes when you deploy identity-based SSH access.
Eliminate SSH Key Management
No more distributing, rotating, or auditing SSH keys on Ubuntu servers. Users authenticate with their corporate identity. Keys are replaced by short-lived certificates.
Zero SSH keys to manageShield from SSH Zero-Days
Gateway mode prevents attackers from reaching Ubuntu's sshd directly. Exploits like regreSSHion become unexploitable — even on unpatched servers.
100% of unauthenticated SSH attacks blockedEnforce MFA on Every Session
Require Duo, FIDO2, or push MFA for every SSH connection to Ubuntu servers — using your IdP's MFA policies. No per-server configuration.
100% MFA-protected SSH sessionsInstant Deprovisioning
Disable a user in your IdP and SSH access to every Ubuntu server stops immediately. No manual authorized_keys cleanup.
Real-time access revocationSession Recording
Record every SSH session on Ubuntu servers for compliance, forensics, and training. Replay sessions keystroke-by-keystroke.
Full session visibilitySOC 2 / HIPAA / PCI Ready
OnePAM provides identity-verified access logs, session recordings, and access reviews that satisfy SOC 2, HIPAA, and PCI DSS requirements.
Audit-ready from day oneSSH SSO Capabilities
Every feature needed for enterprise-grade SSH authentication.
Zero-Day Protection Features
Enterprise-grade security controls for SSH access.
Ubuntu Server SSH SSO Use Cases
Common scenarios where organizations deploy OnePAM SSH SSO.
SSO for SSH on Ubuntu Server FAQ
Common questions about SSH SSO and zero-day protection.
Which Ubuntu versions does OnePAM support?
Does OnePAM modify my Ubuntu sshd configuration?
Can I protect Ubuntu servers I cannot install software on?
How does OnePAM protect against regreSSHion (CVE-2024-6387)?
What happens if the OnePAM gateway goes down?
Can I use OnePAM alongside existing SSH keys?
Add SSO to SSH on Ubuntu Server
Deploy OnePAM in minutes — via local agent or gateway SSH proxy.