Alternatives

Comparison with alternatives

SSH-Frontière is not the only way to control SSH access. This page compares existing approaches to help you choose the right solution.

Comparison table

Criterionauthorized_keys command=SSH-FrontièreTeleportBoundary
TypeOpenSSH optionLogin shellSSH bastionSSH bastion
TargetSingle script per keyService accountsHuman usersHuman users
Granularity1 command per key3-level RBAC, domains, actions, argumentsRoles, labels, RBACIAM policies
LoggingUnstructuredStructured JSON per commandFull session (replay)Audit trail
DeploymentNative (OpenSSH)1 binary + 1 TOML fileCluster (auth server, proxy, node)Cluster (controller, workers)
DependenciesNone0 system dependenciesDatabase, certificatesDatabase
Size—~1 MB (static binary)~100 MB~100 MB
Anti-injectionScript's responsibilityStructural (grammatical parser)N/A (interactive session)N/A (interactive session)
LLM compatibleNoYes (JSON, help, discovery)NoNo
LicenseOpenSSH (BSD)EUPL-1.2AGPL-3.0 (OSS) / CommercialBSL 1.1

authorized_keys with command=

The command= option in authorized_keys forces the execution of a script on each connection. It is the simplest and most widespread solution.

Advantages

Limitations

When to choose command=

Teleport

Teleport is a full SSH bastion with session recording, SSO, certificates, and audit trail.

Advantages

Limitations

When to choose Teleport

HashiCorp Boundary

Boundary is an access proxy that abstracts connection details and integrates external identity sources.

Advantages

Limitations

When to choose Boundary

sudo alone

sudo controls privilege escalation for system commands. Often used alone to restrict service account actions.

Advantages

Limitations

When to choose sudo alone

When to choose SSH-Frontière

SSH-Frontière is designed for a specific use case: controlling what service accounts (not humans) can do via SSH.

Choose SSH-Frontière if:

Don't choose SSH-Frontière if: