The table below outlines the features available for this type of connection.
Native - This refers to when a database client connects through a specific protocol, such as an IDE or client libraries through hoop connect <connection-name>.
One Off - This term refers to accessing this connection from Hoop Web App.
Feature
Native
One Off
Description
Audit
The gateway store and audit the commands being issued by the SSH client.
Data Masking (Google DLP)
A policy can be enabled to mask sensitive fields dynamically for the output.
Data Masking (MS Presidio)
A policy can be enabled to mask sensitive fields dynamically for the output.
Credentials Offload
The user authenticates via SSO instead of using SSH credentials.
# ssh server must enable password based authenticationhoop admin create conn myremote-server -a <agent> --overwrite \ --type application/ssh \ -e HOST=10.20.30.40 \ -e USER=root \ -e PASS=myrootpasswd# ssh server must enable public key authenticationhoop admin create conn myremote-server -a <agent> --overwrite \ --type application/ssh \ -e HOST=10.20.30.40 \ -e USER=root \ -e AUTHORIZED_SERVER_KEYS=file:///path/to/your/private/key
In upcoming releases, we plan to automate the management of users, keys, and passwords on the remote server.
Additionally, our roadmap includes adding a UI for managing such type of connections.
To prevent fingerprint issues when connecting with the local SSH client server,
add the client host key environment variable during gateway setup.The key must be in PKCS#8 format and encoded as base64. You can generate a key with openssl utility:
To troubleshoot the SSH connection with hosts keys, use the --debug flag when running the hoop connect command.
This will provide detailed information about the connection process, including any issues related to parsing the host key.
When using Warp Terminal, you might encounter issues due to its unique handling of SSH connections.
To disable it, set this option in your bash profile or your current shell session