From 93f79b8772e7b46b3e79993ebd834181e325e9a8 Mon Sep 17 00:00:00 2001 From: DarkSun Date: Thu, 27 May 2021 05:03:23 +0800 Subject: [PATCH] =?UTF-8?q?=E9=80=89=E9=A2=98[tech]:=2020210526=206=20exci?= =?UTF-8?q?ting=20new=20ShellHub=20features=20to=20look=20for=20in=202021?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit sources/tech/20210526 6 exciting new ShellHub features to look for in 2021.md --- ...w ShellHub features to look for in 2021.md | 139 ++++++++++++++++++ 1 file changed, 139 insertions(+) create mode 100644 sources/tech/20210526 6 exciting new ShellHub features to look for in 2021.md diff --git a/sources/tech/20210526 6 exciting new ShellHub features to look for in 2021.md b/sources/tech/20210526 6 exciting new ShellHub features to look for in 2021.md new file mode 100644 index 0000000000..9b5310bd12 --- /dev/null +++ b/sources/tech/20210526 6 exciting new ShellHub features to look for in 2021.md @@ -0,0 +1,139 @@ +[#]: subject: (6 exciting new ShellHub features to look for in 2021) +[#]: via: (https://opensource.com/article/21/5/shellhub-new-features) +[#]: author: (Domarys https://opensource.com/users/domarys) +[#]: collector: (lujun9972) +[#]: translator: ( ) +[#]: reviewer: ( ) +[#]: publisher: ( ) +[#]: url: ( ) + +6 exciting new ShellHub features to look for in 2021 +====== +ShellHub's community has been busy adding new features to the open +source remote-access tool. +![People work on a computer server with devices][1] + +ShellHub is a cloud server that allows universal access to your networked devices from any external network. Using it prevents being blocked by firewalls or overly complex networks because [ShellHub][2] uses the HTTP protocol to encapsulate the SSH protocol. This transport layer allows seamless use on most networks, as it is commonly available and accepted by most companies' firewall rules and policies. + +Best of all, ShellHub is open source (released under the Apache 2.0 license) and facilitates developers' and programmers' remote tasks and making access to Linux devices possible for any hardware architecture. + +For a full demo, please read my previous article, [_Bypass your Linux firewall with SSH over HTTP_][3]. In this follow-up article, I'll cover some of the developments and additions in the [0.7.0 release][4]. + +ShellHub offers a safe and quick way to access your devices from anywhere. It has a robust [community][5], whose contributions are essential to the tool's growth, new features, and improvements. I'll describe some of the updates that are (or will soon be) in the [tool's code][6] below. + +### Namespace + +The namespace enables you to create a set of devices to share with other ShellHub users. You can put as many devices as you want in a namespace, but a device registered in one namespace cannot belong to another. + +You can access your namespace by using the top-right button on the Dashboard. There, you will find the namespace Tenant ID, which is used to register a device, and any other namespaces you have created. You can also create a new namespace and access namespace settings. + +You can rename, delete, and invite other users to your namespace. Namespace user permissions work based on privilege, depending on user rank. (See [Privileges][7] for more information.) + +![Namespace][8] + +(Domarys, [CC BY-SA 4.0][9]) + +This feature is available in all editions. The difference is that in the open source version, you must use the terminal to issue commands: + + +``` +`./bin/add-namespace ` +``` + +![Running namespace commands in the terminal][10] + +(Domarys, [CC BY-SA 4.0][9]) + +### Privileges + +Privileges are an organization-level mode for authoring actions in ShellHub. This ensures only the owner has permissions to do potentially dangerous actions. + +There are two privilege ranks: + + * **ADM:** Only the namespace owner has administrator privileges to run an action. The admin can accept and reject devices; view and delete session recordings; create, change, or delete firewall rules; and invite users to the namespace. + * **USER:** A user must be invited by the owner. A user can access devices and any information in the namespace enabled by the owner but cannot remove devices, change firewall rules, or watch session recordings. + + + +### Session recordings + +This new feature records all actions in a ShellHub connection executed by a user or owner. Session recordings are available in the Dashboard in ShellHub Cloud and Enterprise versions. + +![Session recordings][11] + +(Domarys, [CC BY-SA 4.0][9]) + +The session recording feature is on by default. If you are the owner, you can change this in a namespace's Settings. + +![Session recording settings][12] + +(Domarys, [CC BY-SA 4.0][9]) + +Each session's page has details such as hostname, user, authentication, IP address, and session begin and end time. The device's user ID (UID) is available in Details. + +### Firewall rules + +![Firewall rules][13] + +(Domarys, [CC BY-SA 4.0][9]) + +Firewall rules define network traffic permissions (or blocks) to ShellHub devices. This feature is available in the Cloud and Enterprise editions. These rules allow or prevent a device's connection to defined IPs, users, or hostnames. Rules can be set only by a namespace owner. + +In addition to defining the rules, ShellHub enables an owner to set priorities, which block sets of locations or permit access to a location in a blocked set if necessary. + +### Admin console + +![Admin console][14] + +(Domarys, [CC BY-SA 4.0][9]) + +ShellHub developed the admin console to facilitate user support. It offers an easy and clear interface for administrators of large teams to manage and check the activities executed in the ShellHub server. It's available in the Enterprise edition. + +### Automatic access with public keys + +![ShellHub public key][15] + +(Domarys, [CC BY-SA 4.0][9]) + +Automatic connection using public keys is a new feature that will be released soon. It aims to simplify access for users with many different devices and credentials because using a public key makes access quicker and more secure. + +The ShellHub server keeps public key information safe and uses the key only for logging into devices. It also does not have access to users' private keys or other sensitive information. + +Automatic connections using public keys is a recent feature added in ShellHub. + +### Learn more + +Stay up to date on this and other new features and updates on OS Systems' [Twitter][16], [LinkedIn][17], [GitHub][18], or [website][19]. + +-------------------------------------------------------------------------------- + +via: https://opensource.com/article/21/5/shellhub-new-features + +作者:[Domarys][a] +选题:[lujun9972][b] +译者:[译者ID](https://github.com/译者ID) +校对:[校对者ID](https://github.com/校对者ID) + +本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出 + +[a]: https://opensource.com/users/domarys +[b]: https://github.com/lujun9972 +[1]: https://opensource.com/sites/default/files/styles/image-full-size/public/lead-images/rh_003499_01_linux11x_cc.png?itok=XMDOouJR (People work on a computer server with devices) +[2]: https://www.shellhub.io/ +[3]: https://opensource.com/article/20/7/linux-shellhub +[4]: https://github.com/shellhub-io/shellhub/releases/tag/v0.7.0 +[5]: https://www.shellhub.io/community +[6]: https://github.com/shellhub-io +[7]: tmp.jW5CEfWWTN#Privileges +[8]: https://opensource.com/sites/default/files/uploads/shellhub_3namespace.png (Namespace) +[9]: https://creativecommons.org/licenses/by-sa/4.0/ +[10]: https://opensource.com/sites/default/files/uploads/shellhub_2terminal.png (Running namespace commands in the terminal) +[11]: https://opensource.com/sites/default/files/uploads/shellhub_1sessionrecordings.png (Session recordings) +[12]: https://opensource.com/sites/default/files/uploads/shellhub_6sessionrecording.png (Session recording settings) +[13]: https://opensource.com/sites/default/files/uploads/shellhub_5firewallrules.png (Firewall rules) +[14]: https://opensource.com/sites/default/files/uploads/shellhub_4admin.png (Admin console) +[15]: https://opensource.com/sites/default/files/pictures/public_key.png (ShellHub public key) +[16]: https://twitter.com/os_systems +[17]: https://www.linkedin.com/company/ossystems/ +[18]: https://www.facebook.com/ossystems +[19]: https://www.ossystems.com.br/