Enterprise-grade, full-featured
Ultra-light Bastion Host / Jump Server
Unified access for SSH/RDP/VNC/SFTP/HTTP with audit, command interception, and permission control in one platform. Lightweight yet compliance-ready.
Native Protocol Support
Core Capabilities
Comprehensive operations security capabilities for enterprise access control and auditing.
Unified Multi-Protocol Access
Native support for SSH, RDP, VNC, Telnet, and HTTP. Build one secure entry point with SSH gateway and private network gateway.
End-to-End Audit Traceability
Session monitoring, log auditing, command interception, and file operation logs. Every action is traceable for compliance and security.
Zero-Trust Security
Passkey passwordless login, MFA, and brute-force lockout. Integrates with LDAP, OIDC, and WeCom for zero-trust access.
Flexible Permission Control
Multi-user groups, asset authorization, and login policies. Configure session limits and password policies for granular control.
Smart Ops Assistant
AI Shell assistant, SSH control panel, scheduled tasks, and command favorites. Includes WOL and server status monitoring.
Enterprise Customization
Customize logo, system name, and terminal themes. Add watermarks and idle disconnect to enforce branding and security policies.
Feature Highlights
Comprehensive feature coverage for enterprise operations scenarios.
1 Remote Access & Asset Management
Web SSH Terminal
Direct browser access without client installation. Supports SSH/Telnet with customizable terminal themes.
Remote Desktop
Supports RDP and VNC for browser-based graphical remote desktop access.
HTTP Asset Protection
Reverse-proxy internal web apps with custom certificates and automatic SSL issuance.
File Management
SFTP upload/download, batch transfer, and online editing with complete file transfer logs.
Credential Management
Centralized password and key management with sharing and permission isolation.
WOL Wake-up
Use Wake-on-LAN to remotely wake sleeping devices in LAN.
2 Audit & Monitoring
Session Monitoring & Playback
Monitor all active sessions in real time, support session sharing, and replay both text and graphical sessions.
SSH Command Interception
Configure command blacklists to block risky operations (rm -rf, formatting, etc.) in real time.
Log Auditing
Record every login, command, and file operation with searchable and exportable logs.
Server Health Monitoring
Real-time monitoring for CPU, memory, disk, and network status.
Session Watermarking
Add watermark overlays in desktop and terminal sessions with user identity and timestamp.
Idle Timeout Disconnect
Configure idle timeout to automatically disconnect inactive sessions.
3 Security & Authentication
Passkey Passwordless Login
Support WebAuthn Passkey authentication with biometrics or hardware keys.
Two-Factor Authentication
Supports TOTP, email verification, and other second-factor methods. MFA can be enforced.
Brute-force Lockout
Detect brute-force attempts and automatically lock accounts. Supports CAPTCHA.
Enterprise Identity Integration
Supports LDAP, OIDC, and WeCom login. Can also act as an OIDC server.
Login Policies
Configure IP allowlists, time windows, and session limits with custom password strength policies.
IP Geolocation
Automatically detect and record the geolocation of login IP addresses.
4 Operations Productivity Tools
AI Shell Assistant
AI-assisted shell command generation with auto-completion and suggestions.
SSH Server Control Panel
Visual server management panel for system info, process management, and resource monitoring.
Scheduled Tasks
Run shell scripts on schedule with cron expressions for automated operations.
Command Favorites
Save commonly used commands and scripts for quick reuse and team sharing.
Typical Use Cases
Covers key enterprise operations scenarios from compliance auditing to third-party access.
MLPS Compliance Auditing
Industries such as finance, government, and healthcare must meet MLPS 2.0 Level 3 requirements. Next Terminal helps accelerate compliance with identity verification, access control, and security auditing.
Third-Party Access Governance
Outsourcing teams, vendors, and partners can access internal systems through a unified gateway without exposing real IPs, with temporary authorization and full audit trails.
DevOps Permission Governance
Grant environment-specific access for dev, test, and ops teams through role and asset-group authorization with stricter production controls.
Multi-account Cloud Access
Manage host access across AWS, Alibaba Cloud, Tencent Cloud, and other multi-cloud environments in one place to reduce key sprawl and leakage risk.
Technical Architecture
Modern web architecture built with Golang and React, with separated frontend/backend services.
Technology Stack
-
Backend: GolangHigh-performance concurrency
-
Frontend: React + TypeScriptModern user interface
-
Database: PostgreSQLFlexible data persistence
-
Communication: WebSocketReal-time bi-directional communication
Deployment Methods
-
Docker Container DeploymentOne-click start, ready out of the box
-
Docker ComposeSimplified multi-container orchestration
-
Run as Native BinaryFast deployment with no extra dependencies
-
Platform SupportLinux
Frontend Source Code Open
The web frontend is open sourced under Apache-2.0 and can be freely used and customized.
Build an Enterprise Zero-Trust Operations System
Deploy Next Terminal now to make operations access safer, more compliant, and more efficient.