Closed Source · Source-Available (Enterprise)

The Sealed
SSH Access
Platform

Replace static SSH keys with certificate-based authentication, session recording, and fine-grained RBAC. Distributed as a signed binary, not public source. Source-available under our enterprise license for independent audit and scanning.

Architecture

How it works

Users

SSO / OIDC / Certificates

Mezite Proxy

Auth + RBAC + Audit

Agents

Reverse Tunnel to Proxy

SSH Servers

Linux / Unix Hosts

All SSH connections are authenticated with short-lived certificates, authorized via RBAC, and fully audited. No direct network exposure required.

Developer Experience

Built for the terminal

The msh CLI gives you instant SSH access to every node in your infrastructure. Authenticate once, reach everything.

  • Single sign-on via browser or password
  • Auto-generated short-lived SSH certificates
  • Native SSH ProxyCommand support
  • SCP file transfers through the proxy
  • Node listing with label filtering
Terminal bash
# Authenticate with your cluster
$ msh login --proxy=access.example.com --user=alice
> Logged in as alice@example.com
> Certificate valid until 2026-03-25 08:00 UTC

# List available nodes
$ msh ls
Node          Address        Labels
------------- -------------- ----------------
web-prod-01   10.0.1.10      env=prod,app=web
db-replica    10.0.2.20      env=prod,role=db
staging-box   10.0.3.30      env=staging

# Connect to a node
$ msh ssh --login=root web-prod-01
root@web-prod-01:~#
Self-Hosted

Single binary.
Your infrastructure.
Your data.

Mezite runs entirely on your infrastructure. No SaaS dependency, no data leaving your network, no vendor lock-in. Deploy a single signed binary with SQLite (zero dependencies) or PostgreSQL. That's it.

Your CAs
Your Logs
Your Audit
Quick Start

Up and running in three steps

01

Deploy

Pull the signed container image or download the release binary. SQLite built-in, or bring PostgreSQL.

podman login registry.mezite.com podman pull registry.mezite.com/mezite/mezhub:latest
02

Configure

Set your cluster name and start mezhub. CAs are initialized automatically.

export MEZITE_CLUSTER_NAME=access.example.com mezhub --config=mezite.yaml
03

Connect

Install agents on your nodes, log in with msh, and SSH through the proxy.

msh login --proxy=access.example.com msh ssh --login=root web-prod-01
Certificate-Based Auth
Zero Static Keys
Session Recording
RBAC Enforcement
Encrypted In Transit
Audit Logging
SSO / OIDC
Short-Lived Certs
Non-Root Containers
Reverse Tunnels
Certificate-Based Auth
Zero Static Keys
Session Recording
RBAC Enforcement
Encrypted In Transit
Audit Logging
SSO / OIDC
Short-Lived Certs
Non-Root Containers
Reverse Tunnels
Free hosted tier available

Ready to eliminate
static SSH keys?

Run Mezite as a managed instance, license the self-hosted binary, or request enterprise source access for independent review.