Endpoint Management in AuthNull

Endpoint management in AuthNull revolves around ensuring secure access to various endpoints, be it servers, databases, or other networked resources.

Setting Up Endpoints

To set up endpoints in AuthNull, users need to follow a systematic process that ensures secure and seamless integration. The process involves:

  • Registering the endpoint within the AuthNull platform.
  • Downloading and setting up the Endpoint Agent on the desired endpoint.
  • Configuring the authentication flow for the endpoint, which can include multiple factors of authentication.

Learn more about setting up endpoints

Jump Server Creation

AuthNull provides a mechanism to create a jump server. This server acts as an intermediary for accessing other servers, enhancing security by preventing direct access to critical servers.

Details on creating a jump server

LDAP 2-Factor Authentication

For those using LDAP (Lightweight Directory Access Protocol), AuthNull supports 2-factor authentication, adding an extra layer of security to the login process.

How to set up LDAP 2FA

Local 2-Factor Authentication

AuthNull also supports local 2-factor authentication for both SSH and password-based logins. This ensures that even if credentials are compromised, malicious actors cannot gain access without the second factor.

User and Group Synchronization from an Endpoint

Managing local users and groups across various endpoints can be challenging. AuthNull simplifies this process by providing tools to synchronize local users and groups from individual endpoints into the AuthNull platform.

How It Works

  1. Endpoint Registration: Before synchronization can occur, the endpoint must be registered within AuthNull. This involves installing the AuthNull agent on the endpoint and ensuring it can communicate with the AuthNull platform.
  2. Initial Synchronization: Once the endpoint is registered, AuthNull retrieves a list of all local users and groups from the endpoint. These users and groups are then imported into AuthNull, preserving their attributes and memberships.
  3. Ongoing Synchronization: After the initial synchronization, the AuthNull agent monitors the endpoint for any changes to local users or groups. Additions, modifications, and deletions are synchronized in real-time or at scheduled intervals, based on the configuration.

Managing Endpoints

AuthNull provides a comprehensive interface for managing endpoints. Admins can view, modify, and set policies for each endpoint, ensuring that access is always in line with organizational policies.

Endpoint management guide

Credential Rotation

Security best practices recommend regularly changing credentials. AuthNull supports automated credential rotation, ensuring that passwords and SSH keys are changed at regular intervals. This minimizes the risk associated with compromised credentials.

Understanding credential rotation

Configuring Authentication Flow

AuthNull offers flexibility in configuring the authentication flow for endpoints. Admins can choose between password or SSH as the first factor, with DID (Decentralized Identifier) being the default second factor.

Guide to configure authentication flow

By integrating these features, AuthNull ensures that endpoint management is both secure and user-friendly. Whether you’re an admin looking to secure your organization’s resources or an end-user wanting seamless access, AuthNull’s endpoint management has got you covered.