<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: taeyeong</title>
    <description>The latest articles on DEV Community by taeyeong (@baek).</description>
    <link>https://dev.to/baek</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3478454%2Fa9aad032-52a1-4ebb-b0ae-96334f0dfcc8.png</url>
      <title>DEV Community: taeyeong</title>
      <link>https://dev.to/baek</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/baek"/>
    <language>en</language>
    <item>
      <title>Alpacon: Identity, Automation, and Auditing (Part 2)</title>
      <dc:creator>taeyeong</dc:creator>
      <pubDate>Thu, 02 Oct 2025 00:38:03 +0000</pubDate>
      <link>https://dev.to/baek/alpacon-identity-automation-and-auditing-part-2-43ln</link>
      <guid>https://dev.to/baek/alpacon-identity-automation-and-auditing-part-2-43ln</guid>
      <description>&lt;p&gt;In Part 1, we covered how Alpacon reimagines network access through Websh.&lt;br&gt;
This is Part 2: &lt;strong&gt;Identity &amp;amp; Access Management, Integrations &amp;amp; Interoperability, and Auditing.&lt;/strong&gt;&lt;/p&gt;


&lt;h2&gt;
  
  
  Identity &amp;amp; Access Management
&lt;/h2&gt;

&lt;p&gt;When a new developer joins, have you ever issued an SSH ID and password, then sent the server IP and port via Slack? Or asked them to send you their SSH public key to manually register on the server?&lt;br&gt;
Did that feel secure and scalable?&lt;/p&gt;

&lt;p&gt;Identity is a prime target for attacks. Passwords are no longer valid security credentials. Identities provisioned on servers easily become outdated without proper tracking—creating vulnerabilities for hackers or giving disgruntled former employees access to critical assets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt;&lt;br&gt;
Alpacon centrally manages all identities used to access servers.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;New employee → Invite to Alpacon&lt;/li&gt;
&lt;li&gt;Employee leaves → Remove from Alpacon&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When users first connect, their ID and permissions are automatically provisioned. As changes occur, Alpacon tracks them continuously. System accounts are created as passwordless. Logging in through other means isn't possible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enforced MFA&lt;/strong&gt;&lt;br&gt;
Workspace admins can require enhanced MFA when users connect in privileged mode (typically root access). Supported methods:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Biometric, Hardware security keys, OTP, Email, SMS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Enterprise Integration&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Google Workspace integration&lt;/li&gt;
&lt;li&gt;SAML support coming soon&lt;/li&gt;
&lt;li&gt;Security-designed and white-hat verified&lt;/li&gt;
&lt;li&gt;Redundant architecture prevents single points of failure&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  Integrations &amp;amp; Interoperability
&lt;/h2&gt;

&lt;p&gt;Have you needed to give SSH access to CI/CD pipelines? Did you open your firewall to allow GitHub Actions or GitLab CI/CD with dynamic IPs? Were you worried about deployment SSH keys being misused?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Alpacon CLI and REST API&lt;/strong&gt;&lt;br&gt;
Execute workloads and transfer files with a single command. The CLI uses SSH-like syntax for familiarity.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;alpacon login https://alpacon.io/my-workspace -t "alpat-..."
alpacon cp docker-compose.yml prod-docker:/opt/my-app/
alpacon cp .env prod-docker:/opt/my-app/
alpacon websh prod-docker docker compose -p my-app --env-file .env up -d
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Fine-Grained Control&lt;/strong&gt;&lt;br&gt;
Tokens protected by fine-grained rules can only execute permitted commands. Block unauthorized parties from abusing CI to execute arbitrary commands.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;curl -X POST https://my-workspace.us1.alpacon.io/api/events/commands/ \
     -H "Content-Type: application/json" \
     -H "Authorization: Token alpat-..." \
     -d '{"server": "7a50ea6c-2138-4d3f-9633-e50694c847c4", "line": "docker ps", "username": "docker"}'
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Integrate safely with CI/CD under strong control.&lt;/p&gt;

&lt;h2&gt;
  
  
  Auditing
&lt;/h2&gt;

&lt;p&gt;Do you track who executed what commands on your servers and when? Many companies don't know who caused an issue even when incidents occur. Access to critical assets should be monitored, but few actually do it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Full Visibility&lt;/strong&gt;&lt;br&gt;
Alpacon logs all user connections as an access gateway:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time monitoring of terminal access&lt;/li&gt;
&lt;li&gt;Block suspicious activity immediately&lt;/li&gt;
&lt;li&gt;Post-incident command audit&lt;/li&gt;
&lt;li&gt;Complete command history with timestamps and attribution&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You know who accessed which server, when they connected, what commands were executed, where the access came from, and how they authenticated.&lt;br&gt;
No more blind spots. No more guessing. Just complete accountability.&lt;/p&gt;

&lt;h2&gt;
  
  
  Concluding Thoughts
&lt;/h2&gt;

&lt;p&gt;Why have we assumed that stronger security must mean harder access?&lt;br&gt;
Alpacon proves you don't have to choose. Security and accessibility aren't opposites—they're two sides of the same modern infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Next?
&lt;/h2&gt;

&lt;p&gt;We built Alpacon because we were tired of the same old problems: dropped SSH sessions, manual key management, and zero visibility into who's doing what.&lt;/p&gt;

&lt;p&gt;If you've felt the same frustration, we'd love to have you try it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get Started:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🚀 &lt;strong&gt;&lt;a href="https://forms.gle/oVMBcz9fhpLQh3kMA" rel="noopener noreferrer"&gt;Join the Beta&lt;/a&gt;&lt;/strong&gt; and see how Alpacon works in your environment&lt;/li&gt;
&lt;li&gt;💬 &lt;strong&gt;&lt;a href="https://discord.com/invite/wadWh8VsYB" rel="noopener noreferrer"&gt;Join Discord&lt;/a&gt;&lt;/strong&gt; to share your experience and help shape what we build next&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We're building this in the open. Your feedback matters.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>devops</category>
      <category>discuss</category>
      <category>security</category>
    </item>
    <item>
      <title>Alpacon: Network Access and Resource Management (Part 1)</title>
      <dc:creator>taeyeong</dc:creator>
      <pubDate>Tue, 30 Sep 2025 00:28:07 +0000</pubDate>
      <link>https://dev.to/baek/alpacon-network-access-and-resource-management-part-1-coo</link>
      <guid>https://dev.to/baek/alpacon-network-access-and-resource-management-part-1-coo</guid>
      <description>&lt;p&gt;&lt;em&gt;We've talked about the problems with SSH and VPN. We've explained why the old model no longer works.&lt;br&gt;
Now it's time to show you what we built instead.&lt;br&gt;
This is Part 1 of how Alpacon redefines server access: Network Access with Websh, Accessibility Without VPNs, and Resource Management.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Network Access with Websh
&lt;/h2&gt;

&lt;p&gt;Alpacon sits between clients and servers as an access gateway.&lt;br&gt;
Instead of relying on SSH, we built our own protocol: Websh—designed from the ground up for scalability, security, and modern infrastructure.&lt;br&gt;
How Websh Works&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;No privileged ports required&lt;/strong&gt;: No more opening port 22 or managing firewall rules&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Reverse connection model&lt;/strong&gt;: Servers initiate connections to Alpacon; no inbound ports exposed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Always runs over TLS&lt;/strong&gt;: Cryptographic security by default, no configuration needed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;SSH risks reduced to zero&lt;/strong&gt;: Attackers can't scan for port 22 because it's not there&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Traditional SSH exposes servers to the internet. Websh hides them behind Alpacon's gateway.&lt;br&gt;
One less attack surface. One less thing to worry about.&lt;/p&gt;

&lt;h2&gt;
  
  
  Accessibility Without VPNs
&lt;/h2&gt;

&lt;p&gt;Have you ever lost an SSH session mid-task because of a flaky VPN or unstable network?&lt;br&gt;
We have. Too many times.&lt;br&gt;
Persistent Sessions&lt;br&gt;
Alpacon's Websh sessions persist until the user explicitly ends them.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Close your laptop&lt;/li&gt;
&lt;li&gt;Change networks&lt;/li&gt;
&lt;li&gt;Reconnect WiFi&lt;/li&gt;
&lt;li&gt;Switch from office to home&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your session is still there.&lt;br&gt;
No reconnecting. No lost work. No frustration.&lt;br&gt;
Mobile Access&lt;br&gt;
Even better: Alpacon gives you instant shell access from a mobile browser.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No VPN required&lt;/li&gt;
&lt;li&gt;No client installation&lt;/li&gt;
&lt;li&gt;Just open the browser and connect&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Emergency fix at 2AM while you're away from your laptop? No problem.&lt;/p&gt;

&lt;h2&gt;
  
  
  Resource Management
&lt;/h2&gt;

&lt;p&gt;Managing servers shouldn't require spreadsheets, Slack threads, and tribal knowledge.&lt;br&gt;
Alpacon makes it simple.&lt;br&gt;
One-Line Server Registration&lt;br&gt;
Admins can register all servers into a workspace in minutes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Paste a one-line script into the terminal&lt;/li&gt;
&lt;li&gt;Agent installs automatically&lt;/li&gt;
&lt;li&gt;Server is live in Alpacon&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That's it.&lt;br&gt;
&lt;strong&gt;Real-Time Visibility&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All servers monitored in real time&lt;/li&gt;
&lt;li&gt;Grouped by team, role, or project&lt;/li&gt;
&lt;li&gt;Access granted with role-based controls&lt;/li&gt;
&lt;li&gt;No more "who owns this server?" confusion&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Centralized Control&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Onboard a new teammate → grant access to their servers instantly&lt;/li&gt;
&lt;li&gt;Someone leaves → revoke everywhere with one click&lt;/li&gt;
&lt;li&gt;Need to rotate credentials? Done across all servers at once&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Everything in one place. Everything under control.&lt;/p&gt;

&lt;p&gt;What's Next?&lt;br&gt;
This is just Part 1.&lt;br&gt;
In Part 2, we'll cover Identity &amp;amp; Access Management, Integrations &amp;amp; Automation, and Auditing—the pieces that make Alpacon a complete access platform.&lt;br&gt;
👉 Curious? &lt;a href="https://www.alpacax.com/newsroom/archive/alpacon-launches-saas-beta-join-early-access/" rel="noopener noreferrer"&gt;&lt;strong&gt;Test it in Beta&lt;/strong&gt;&lt;/a&gt; &lt;br&gt;
💬 &lt;a href="https://discord.com/invite/wadWh8VsYB" rel="noopener noreferrer"&gt;&lt;strong&gt;Join our Discord and share your thoughts&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>networking</category>
      <category>devops</category>
      <category>architecture</category>
      <category>security</category>
    </item>
    <item>
      <title>Rethinking Server Access: Beyond SSH</title>
      <dc:creator>taeyeong</dc:creator>
      <pubDate>Thu, 25 Sep 2025 07:51:56 +0000</pubDate>
      <link>https://dev.to/baek/rethinking-server-access-beyond-ssh-5b67</link>
      <guid>https://dev.to/baek/rethinking-server-access-beyond-ssh-5b67</guid>
      <description>&lt;p&gt;&lt;em&gt;In the first post, we talked about how SSH was built for the 1990s.&lt;br&gt;&lt;br&gt;
In the second, we broke down the major problems legacy SSH creates for today’s infrastructure.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;So the question is: &lt;strong&gt;what comes next?&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Rethink Access?
&lt;/h2&gt;

&lt;p&gt;This isn’t just about inconvenience — it’s about &lt;strong&gt;structural limitations&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;
SSH and VPN assumed only human access. IAM lived separately. Auditing was handled elsewhere.  &lt;/p&gt;

&lt;p&gt;But attacks have grown more sophisticated, systems more complex, and automation is everywhere.&lt;br&gt;&lt;br&gt;
We’re still trying to rely on a 1990s model in a 2025 environment.  &lt;/p&gt;

&lt;p&gt;It’s time to redefine access itself.  &lt;/p&gt;




&lt;h2&gt;
  
  
  Introducing Websh
&lt;/h2&gt;

&lt;p&gt;When we reimagined server access, we focused on eliminating the biggest weaknesses of SSH:&lt;br&gt;&lt;br&gt;
open ports, fragile sessions, and siloed identity and auditing.  &lt;/p&gt;

&lt;p&gt;That led us to &lt;strong&gt;Websh&lt;/strong&gt;, a new protocol at the core of Alpacon’s &lt;strong&gt;Access Gateway&lt;/strong&gt;.  &lt;/p&gt;

&lt;h3&gt;
  
  
  🌐 No Open Ports
&lt;/h3&gt;

&lt;p&gt;Attackers love port 22. Websh removes it completely.&lt;br&gt;&lt;br&gt;
Servers make outbound connections only — nothing exposed, nothing to scan.  &lt;/p&gt;

&lt;h3&gt;
  
  
  🔒 Web-Native by Design
&lt;/h3&gt;

&lt;p&gt;Every session runs over TLS (the same tech behind https://).&lt;br&gt;&lt;br&gt;
No VPNs. No special clients. Just stable, browser-friendly connections that survive network drops.  &lt;/p&gt;

&lt;h3&gt;
  
  
  👥 Simple IAM &amp;amp; Auditing
&lt;/h3&gt;

&lt;p&gt;Invite or remove teammates in seconds, with identity managed centrally.&lt;br&gt;&lt;br&gt;
Every action is logged and auditable, with anomalies flagged in real time.  &lt;/p&gt;




&lt;h2&gt;
  
  
  Redefining Access
&lt;/h2&gt;

&lt;p&gt;Instead of separating network access, identity, and auditing, Alpacon unifies them into a single gateway —&lt;br&gt;&lt;br&gt;
a platform designed for modern infrastructure and developer workflows.&lt;/p&gt;




&lt;p&gt;👉 Want to be part of the discussion?  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Join the &lt;a href="https://discord.com/invite/wadWh8VsYB" rel="noopener noreferrer"&gt;&lt;strong&gt;Discord Community&lt;/strong&gt;&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Try the &lt;a href="https://www.alpacax.com/newsroom/archive/alpacon-launches-saas-beta-join-early-access/" rel="noopener noreferrer"&gt;&lt;strong&gt;Beta Program&lt;/strong&gt;&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>devops</category>
      <category>ssh</category>
      <category>security</category>
      <category>discuss</category>
    </item>
    <item>
      <title>The Problem With Legacy Access</title>
      <dc:creator>taeyeong</dc:creator>
      <pubDate>Wed, 24 Sep 2025 07:34:21 +0000</pubDate>
      <link>https://dev.to/baek/the-problem-with-legacy-access-19kf</link>
      <guid>https://dev.to/baek/the-problem-with-legacy-access-19kf</guid>
      <description>&lt;p&gt;_In the last post, we talked about how SSH was built for the 1990s — and why it no longer fits today’s infrastructure.&lt;br&gt;&lt;br&gt;
But what does that really mean in practice? Let’s break it down.  _&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problems We See
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Security holes&lt;/strong&gt;: Port 22 is the first target attackers scan. A single weak point can break the whole chain.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Operational pain&lt;/strong&gt;: Servers scattered across spreadsheets, unclear ownership, fragile onboarding/offboarding.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automation gap&lt;/strong&gt;: DevOps platforms, CI/CD, and AI agents all need access, but SSH was never designed for them.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit blind spots&lt;/strong&gt;: Actions are not always visible or verifiable.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Meanwhile, APTs and ransomware are everywhere, and servers have become their primary targets.&lt;br&gt;&lt;br&gt;
The old way is no longer enough.  &lt;/p&gt;




&lt;p&gt;👉 Curious about alternatives?  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Explore what we’re building in the &lt;a href="https://www.alpacax.com/newsroom/archive/alpacon-launches-saas-beta-join-early-access/" rel="noopener noreferrer"&gt;&lt;strong&gt;Beta Program&lt;/strong&gt;&lt;/a&gt;.
&lt;/li&gt;
&lt;li&gt;Or join the &lt;a href="https://discord.com/invite/wadWh8VsYB" rel="noopener noreferrer"&gt;&lt;strong&gt;Discord Community&lt;/strong&gt;&lt;/a&gt; to share your thoughts and hear from others.
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>devops</category>
      <category>ssh</category>
      <category>security</category>
      <category>discuss</category>
    </item>
    <item>
      <title>SSH Was Built for the 90s. Is It Still Enough?</title>
      <dc:creator>taeyeong</dc:creator>
      <pubDate>Tue, 23 Sep 2025 08:06:43 +0000</pubDate>
      <link>https://dev.to/baek/ssh-was-built-for-the-90s-is-it-still-enough-4nnm</link>
      <guid>https://dev.to/baek/ssh-was-built-for-the-90s-is-it-still-enough-4nnm</guid>
      <description>&lt;p&gt;If you’ve worked with servers, you’ve probably lived inside SSH and VPNs.&lt;br&gt;&lt;br&gt;
For decades, they’ve been the backbone of server access.  &lt;/p&gt;

&lt;p&gt;But the truth? They’ve caused more pain than convenience.  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;VPN dropped mid-deploy and killed my SSH session&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Onboarding a new teammate meant generating keys, sharing IPs, updating firewall rules&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A 2AM production outage left only this in the logs: 
&lt;code&gt;root executed systemctl restart…&lt;/code&gt;&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Opening firewall ports just so GitHub Actions could reach servers&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;SSH was great. But it was a tool &lt;strong&gt;built for the 1990s.&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
It no longer fits today’s cloud-native, automated, AI-driven infrastructure.  &lt;/p&gt;




&lt;p&gt;👉 Want to continue the conversation?  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Join our &lt;a href="https://discord.com/invite/wadWh8VsYB" rel="noopener noreferrer"&gt;&lt;strong&gt;Discord&lt;/strong&gt;&lt;/a&gt; and share your thoughts.
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;If these pain points sound familiar, we wrote more about why we believe SSH no longer fits modern infrastructure in this article:&lt;br&gt;&lt;br&gt;
👉 &lt;a href="https://www.alpacax.com/newsroom/archive/alpacon-launches-saas-beta-join-early-access/" rel="noopener noreferrer"&gt;Read here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And if you’re also looking for a better way to access and manage servers, we’d love for you to try our Beta.&lt;/p&gt;

&lt;p&gt;We’d love to hear directly from people who actually manage servers every day.&lt;br&gt;
Join the Beta, share your experience, and let us know what really works. 🚀&lt;/p&gt;

</description>
      <category>devops</category>
      <category>ssh</category>
      <category>security</category>
      <category>discuss</category>
    </item>
    <item>
      <title>If You Could Redesign Server Access, What Would You Build?</title>
      <dc:creator>taeyeong</dc:creator>
      <pubDate>Tue, 23 Sep 2025 07:35:45 +0000</pubDate>
      <link>https://dev.to/baek/if-you-could-redesign-server-access-what-would-you-build-121</link>
      <guid>https://dev.to/baek/if-you-could-redesign-server-access-what-would-you-build-121</guid>
      <description>&lt;p&gt;I’m genuinely curious.&lt;br&gt;&lt;br&gt;
For those of you managing servers day to day:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Do you find SSH still works fine for you?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Or do you run into pain points (key management, VPN drops, onboarding/offboarding, lack of auditing, etc.)?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;If you could design the &lt;em&gt;ideal&lt;/em&gt; way to access and manage servers, what would it look like?&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I work at a team that’s exploring a new approach to server access.&lt;br&gt;&lt;br&gt;
But before anything else, I want to hear directly from the community.  &lt;/p&gt;

&lt;p&gt;What are your real frustrations?&lt;br&gt;&lt;br&gt;
What would make your lives easier?  &lt;/p&gt;

&lt;p&gt;We’ve also opened a Discord community where we’re talking about DevOps, security, and new ways to approach infra access.&lt;br&gt;&lt;br&gt;
👉 &lt;a href="https://discord.com/invite/wadWh8VsYB" rel="noopener noreferrer"&gt;Join here&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;I’d love to get your perspectives and learn what matters most to you.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>ssh</category>
      <category>security</category>
      <category>discuss</category>
    </item>
  </channel>
</rss>
