Latest news and blog from JumpServer Team
How to Configure JumpServer Virtual Applications: Integrated vs. External Deployment
Learn how to configure JumpServer Virtual Applications step-by-step using either Integrated or External Deployment modes, and give your users browser-based access to privileged desktop apps through the Web Terminal.
Published on 2026-04-28
JumpServer Access Control Guide: Block High-Risk Linux Commands Before They Execute
Learn how to use JumpServer's Access Control and command filtering to block dangerous Linux commands like rm, DROP DATABASE, and chmod — with step-by-step setup for command groups, filters, approval workflows, and four ACL rule types (command filter, login, asset connection, data masking).
Published on 2026-04-23
JumpServer Troubleshooting Guide: Fix Core, Login, and Component Errors
A practical JumpServer troubleshooting guide covering Core startup failures, web page errors, login issues (password reset, account lockout, MFA reset, LDAP), and privileged user connection problems.
Published on 2026-04-23
Secrets Management Best Practices for Enterprise Security (2026 Guide)
Learn the top secrets management best practices for 2026. Protect API keys, SSH keys, tokens, and credentials across your enterprise with centralized vaults, automated rotation, audit logging, and JumpServer PAM." slug: "secrets-management-best-practices
Published on 2026-04-22
Top 10 Privileged Access Management Tools in 2026
The top 10 privileged access management tools in 2026, compared by features, deployment model, pricing, and use case. Includes open-source options, enterprise PAM platforms, and cloud-native solutions to help security teams choose the right fit.
Published on 2026-04-21