1. Getting Started

EAMS(Equipment Account Management System) is a web-based terminal tool to remote access to hosts.
It supports accessing to all of SSH or RDP hosts in your VPC through the web browser.

This is a quick start guide. We will guide you from installing EAMS to connecting to your instances.

To do that, you need to have hosts to connect to.
prerequisites :
1) Network connection between EAMS and the SSH/RDP hosts.
2) Using the password authentication method for connecting to the hosts.

There is a license limit in the free version. EAMS does not have its own backup function. If you want a backup, use AWS services.

1.1. Install EAMS

When you create an instance for EAMS, the EAMS service is set to start automatically.
Just you launch the EAMS product, you can access the application via web browser at https://<public_dns>:8443
However EAMS instance need to be granted privileges to discovery your instances. To grant privileges to EAMS instance, follow the instructions below.

1.1.1. Create instance profile

  1. Go to https://console.aws.amazon.com/iam/home#/policies$new?step=edit

  2. Switch to the JSON tab and paste the following policy. This policy grants the instance access to CloudWatch Logs to push the connection history and the ability to assume an IAM role in any account where you are running instances.

AWS Policy (eamsaws) :

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "ec2:DeleteTags",
                "ec2:CreateTags"
            ],
            "Resource": "arn:aws:ec2:*:*:instance/*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Allow",
            "Action": [
                "ssm:SendCommand",
                "ssm:DescribeInstanceInformation",
                "logs:CreateLogGroup",
                "ssm:GetCommandInvocation"
            ],
            "Resource": "*"
        }
    ]
}
  1. Click on Review Policy, provide a name such as eamsaws and click on Create Policy

  2. Go to https://console.aws.amazon.com/iam/home#roles$new

  3. Choose EC2 under services that will use this role

  4. Search the following and click Next

    • AmazonEC2ReadOnlyAccess

    • AWSCloudTrailFullAccess

    • CloudWatchEventsFullAccess

    • AmazonS3FullAccess

    • AmazonSNSFullAccess

    • eamsaws (which you create in the previous step)

  5. Provide a role name such as "EAMSAWS" and click on Create Role

  6. Go to EC2 Service menu

  7. Select the instance which EAMS is installed and Click on Actions → Instance Settings → Attatch/Replace IAM Role

  8. Choose EAMSAWS in IAM role list. and Apply

Now you are ready to use EAMS.

1.2. Starting EAMS

In this step, We will try to access the instance from the first login.

1.2.1. Connect EAMS

Access EAMS Web browser.

Sunset

1.2.2. First login

On the EAMS web, log in with ID(user defined) and instance ID as a password.

Sunset

Then, you can see the popup window for Register Admin. Enter user name, Department, Password, confirm password and save.
After register admin, return to Login page. Login again.

Sunset

1.2.3. Connect hosts

After login, you go to the Equipment Tab screen.

Sunset

Click the sync button, EAMS will discovery your instances.

Sunset

If it successful discovery, you will see a list of AWS console instances in equipment tab.
If it ends up failing, it’s probably because of privileges or network problem, so check it.

Sunset

Equipments are visible on the HOME page. And each equipment has a connect buttons on the right.

Sunset

Click the connect button.

Sunset

Enter the ID/Password of the instance.

Sunset

If you see the terminal screen, you have successfully connected to the hosts through EAMS.

Sunset

1.3. When you cannot connect to the hosts

1.3.1. SSH

  • Check if communication from EAMS to host

execute this command in EAMS server

telnet [host ip] 22

for example : telnet 1.1.1.1 22

When connecting normally :

$ telnet [host ip] 22
Connected to [host ip]]
Escape character is '^]'

When cannot connecting :

$ telnet [host ip] 22
telnet: connect to address [host ip]: Connection timed out

If not connected, configure network inbound for AWS EC2

  • Check if Password Authentication

execute this command in EAMS server

$ cat /etc/ssh/sshd_config | grep PasswordAuthentication

If PasswordAuthentication is "no", set to "yes"

PasswordAuthentication yes

Restart ssh daemon

$ systemctl restart sshd

or

$ service sshd restart

1.3.2. RDP

  • Check if communication from EAMS to host

run this command in EAMS server

telnet [host ip] 3389

When connecting normally :

$ telnet [host ip] 3389
Connected to [host ip]]
Escape character is '^]'

When cannot connecting :

$ telnet [host ip] 3389
telnet: connect to address [host ip]: Connection timed out

If not connected, configure network inbound for AWS EC2

  • Check if you have set an account password

    1. In the Start screen, run lusrmgr.msc

    2. Click Users

    3. Right click on your account and click "Set Password"

    4. Set password

Or run this command on CMD

> net user [account] [password]

for example : net user eamsadmin asdf1#

  • Check if your account is in remote desktop group

    1. In the Start screen, run lusrmgr.msc

    2. Click Groups

    3. Add your account in "Remote Desktop Users"

Or run this command on CMD

> net localgroup "Remote Desktop Users" [account] /add

for example : net localgroup "Remote Desktop Users" eamsadmin /add

  • Check if 'Authenticated Users' is in 'Access this computer from the network'

    1. In the Start screen, run secpol.msc

    2. Security Settings > Local Policies > User Rights Assignment

    3. Double click "Access this computer from the network"

    4. Click "Add User or Group"

    5. Enter "Authenticated Users" and click OK.

  • Check if not using NLA

    1. In the Start screen, run sysdm.cpl

    2. Click Remote Tab

    3. Check "Allow connections from computers running any version of Remote Desktop"

    4. Uncheck "Allow connections only from computers running Remote Desktop with Network Level Authentication"

2. Using Web Terminal

Web terminal provides TEXT copy / paste and file transfer service. Chrome extensions are available for convenient use of these terminal features. We recommend using the chrome extension. You only need to install the chrome extension once. You can download the extension installation file from the EAMS web.

2.1. Using Clipboard

You can copy / paste text between your terminal and your pc.

2.1.1. From the instance to your PC

  1. Copy text

    • Linux/Unix : Drag the text you want to copy

    • Windows : Ctrl+c or right-click and copy

  2. Paste it by Ctrl + v or right-click and paste on your PC.

2.1.2. From your PC to the instance

  1. Copy text from your PC

  2. Paste it on terminal.

    • Linux/Unix : Right click

    • Windows : Ctrl+v or right-click paste

2.2. File Transfer

You can transfer files between your terminal and your pc using EAMS Object Storage.

upload : User PC → EAMS Storage → Equipment
download : Equipment → EAMS Storage → User PC

Conditions for file transfer :
1) Communication via 8443 port from instance to EAMS
2) If your host is unix, install curl

2.2.1. File upload

For Linux/Unix :

  1. Drag and drop the file to upload to the terminal.

Sunset
  1. File transfer proceeds and a pop-up message appears when the transfer is complete (File transfer: User PC → EAMS Storage)

  2. Click the Copy To clipboard button in the pop-up message.

Sunset
  1. Right-click or paste to paste the path saved in the clipboard to the terminal.

  2. Press Enter, the file is downloaded to the device through the curl command. (File transfer: EAMS Storage → Equipment)

Sunset

For Windows :

  1. Drag & Drop the file to upload onto the terminal.

Sunset
  1. File transfer proceeds and a pop-up message appears when the transfer is complete (File transfer: User PC → EAMS Storage)

  2. Click the Copy To clipboard button in the pop-up message.

Sunset
  1. Run the browser (IE / Chrome / Firefox) installed in Windows and paste the path saved in clipboard in the address bar.

Sunset
  1. If a warning page appears, click Go to (Unsafe) at the bottom of the page to start the download.

Sunset
  1. Download the file to the equipment through the browser’s file download.(File transfer: EAMS Storage → Equipment)

Sunset
  1. Open the folder and open the download folder to check the downloaded file.

2.2.2. File download

For Linux/Unix :

  1. Pressing Ctrl + Alt + Shift brings up the EAMS menu.

  2. Double-click the file to download from the file list on the Device tab.

Sunset
  1. If you double-click, the link to be downloaded from the equipment to EAMS Storage is automatically saved in the clipboard.

Sunset
  1. Right-click or paste to paste the path saved in the clipboard to the terminal.

  2. If you press Enter, it is downloaded to EAMS Storage through curl command. (File transfer: Equipment → EAMS Storage)

  3. When downloading to EAMS Storage is completed, a pop-up message appears.

Sunset

7.Click the Download button to download it to your PC. (File transfer: EAMS Storage → User PC)

Sunset

For Windows :

  1. To download files on the equipment, you must use the EAMS upload page. Click the Get URL button under the Object Storage tab of the EAMS Menu.
    Pressing Ctrl + Alt + Shift brings up the EAMS menu.

Sunset
  1. Clicking the Get URL button copies the EAMS upload page address to the clipboard.

Sunset
  1. Run Browser (IE / Chrome / Firefox) and paste the address stored in the clipboard into the address bar.

Sunset
  1. Drag & Drop or click browse link to upload the file to download in the middle of the EAMS upload page.

Sunset
  1. The upload progress is displayed, and when completed, a check mark appears. (File transfer: Equipment → EAMS Storage)

  2. When uploading to EAMS Storage is completed, a pop-up message appears.

Sunset
  1. Click the Download button to download it to your PC. (File transfer: EAMS Storage → User PC)

Sunset

3. Connect Equipments

When connecting to the equipment, you click the connect button and enter the ID and password.
If it is troublesome to input each time you access the equipment, you can save the connection information and access it immediately.

3.1. Registering accounts manually for quick connection.

Enter Equipments Tab

Sunset

You can see the equipments list. and click the key icon.

Sunset

Click add button.

Sunset

Enter the id/password of instance and click save button. If you only want to save the account, do not enter the password.

Sunset

Let’s go back to the home screen and check the connection.

Sunset

Connect to the equipment you registered your account information, so you can access immediately.

3.2. Registering accounts automatically using SSM for quick connection.

If your instances use SSM service, eams can get accounts of the instances through SSM. First, EAMS to use the SSM service, you need to change the equipment settings.

Enter Equipments Tab

Sunset

Check the check box the equipment and Modify button.

Sunset

Change certification from NONE to AWS-SSM type.

Sunset

Now EAMS can get accounts of the instance through SSM service.
Next, let’s get accounts of the instance. Click the account key of the equipment in Equipments Tab.

Click Account Sync button.

Sunset

If sync is successful, you can see the accounts list of instance. you can save password of account. If you only want to save the account, do not enter the password.

Sunset

Let’s go back to the main page and check the connection. Connect to the equipment you registered your account information, so you can access immediately.

Sunset

4. Viewing Access History

4.1. Viewing access audit

You can view the history of other users' instance access. And the commands executed in the terminal are recorded as text and the work performed in the terminal is recorded as a video.
You can search the connection history by selecting the desired period at the top right of the chart, and up to one month.

  1. Go to the Access Audit tab

  2. Check connection history. You can download it as a csv file.

4.2. Viewing my connection history

You can view the connection history and the tasks you have performed.

  1. Go to the Connection History

  2. You can check the history, and if the instance is Linux/Unix, you can get the logs as txt file.

5. Register User and Create Group

You can register EAMS users so that others can access your instance through EAMS and you can create groups for access management.

5.1. Register User

Let’s register User.
detail > User management

  1. Go to the Users tab.

  2. Click the add button.

Sunset
  1. Enter ID, Name, Department, Password information and click > button.

Sunset
  1. Select Group and User Level and save.

Sunset

5.2. Create Group

First of all, the concept of Group is a group of instances to separate access. By separating instances into groups, only users who need access can access instances. To manage as a group, create a group and map equipment and users to the group.
detail > Group management

Create a group by following the guide below.

  1. Create group.

Go to the group tab. Click the + ADD group button at the bottom left of the home screen.

Sunset

Save the group information.

Sunset
  1. Register equipments in the group

Select a group on the home screen and click the Equipment List Setting button.

Sunset

Select the equipments to be registered in the group and add it to the group with > button. Click the Save button.

Sunset
  1. Register users in the group

Select a group on the main screen and click the Member List Setting button.

Sunset

Select a user to be registered in the group and add it to the group with > button. Click the Save button.

Sunset

Users assigned to a group can access only equipments assigned to the group.

Sunset

6. EAMS Management

6.1. User management

There are three levels of EAMS users. The EAMS Tab appears differently for each user level.

USER

You have the authority to access the instance designated by the administrator.

Workgroup Admin

You have the authority to add users, instances, and groups. Create groups and add users and instances to the groups to give users access to the instances. Workgroup Admin has all the privileges that the user has.

Admin

You have the authority to add a Workgroup Admin to each workgroup and configure the EAMS system. Admin has all privileges that Workgroup Admin has.

USER LEVEL Tab

USER

Instance access screen (Home), record of the user access (Connection History), password inquiry record (Event History)

WORKGROUP ADMIN

Instance access screen and group management (Home), instance management (Equipments), user management (Users), Instance access history (Access Audit), password inquiry history (Event History)

ADMIN

Instance access screen and group management (Home), instance management (Equipments), user management (Users), Instance access history, system change history, system setting

You can search, add, modify and delete Users on the User tab.

6.1.1. Add User

  1. Click Add button.

  2. Fill out the form and save.

  3. Click the > button to add and select the group and privilege.

  4. Click the Save button.

6.1.2. Modify User

Select the user to be modified and modify it with the modify button.

6.1.3. Delete User

Select the user to be deleted and delete it with the delete button.

6.2. Equipment management

You can search, sync, modify, and delete equipments on the Equipment tab.

6.2.1. Sync Equipment

Click the sync button to synchronize the equipments with the instances in the AWS console. Equipment added as a sync is assigned to the default group, "Unknown" group.

6.2.2. Modify Equipment

Select the equipment and modify it with the modify button.

Sunset

Instance ID

instance id

Name

name of the instance

IP

communicable IP with EAMS

Port

port to connect

OS

instance OS type

Protocol

protocol to connect

Account for Access-ID

account for connecting to instance

Account for Access-Password

account password for connecting to instance

6.2.3. Delete Equipment

Select the equipment and delete it with the delete button.

6.2.4. Access account management

You can access the equipment conveniently by storing the access information in EAMS.
When using the SSM service, You can change the password for your instance account in EAMS. Also, It is possible to automatically change password periodically.

For your instance without SSM service :

Press the account key icon in the equipment list.

  • Add : Add account/password to connect.

  • Delete : Delete the registered account information.

For your instance with SSM service :

Press the account key icon in the equipment list.

  • Account Sync : Synchronize and register the account of the instance.

  • Automatic Password Change : If you check Automatic password change, the password is changed periodically. The password of the instance is changed, and the password is set at random. The password change period can be set by the admin in the system settings.

  • Save Password

    • EAMS : Save only in EAMS and access with the password entered

    • EAMS & Equipment : The account password of the instance is changed with the password you entered and it is stored in EAMS.

6.3. Group management

Group is sub-workgroup. You can create multiple Groups under one WorkGroup and assign instances and users to the Groups. Users assigned to the group can access only the instances assigned to the group.

6.3.1. Add Group

You can create a group by filling in group information form with the +ADD GROUP button.

Input item Description Remark

Work Group

WorkGroup to add Group

necessary

Group Name

Group name

necessary

Available Period

How long to use Group

Permanent Check for permanent use

Description

Group Description

option

6.3.2. Modify Group

Select the change icon of the group to be edited and edit it.

6.3.3. Delete Group

Select the delete icon of the group to be deleted and delete it. When deleting a group, the instances and users set in the group are deleted. Instances and user set in WorkGroup are maintained.

6.3.4. Group User Management

Users belonging to a group can access instances registered in the group.

Add users to group :
1. Select the group to which you want to add the user in home screen.
2. Select a user to be registered in the group and add it to the group with > button. Click the Save button.

Delete users from group :
1. Select the group to which you want to delete the user in home screen.
2. Select the user to be delete from the group and delete it to the group with < button. Click the Save button.

6.3.5. Group Equipment Management

By registering the instance added to the WorkGroup to the Group, you can separate the equipment usage policy for each group.

Add equipments to group :
1. Select the group to which you want to add the instance.
2. Select the equipments to be registered in the group and add it to the group with > button.
3. Click the Save button.

Delete equipment from group :
1. Select the group to which you want to delete the equipment in home screen.
2. Select the equipment to be delete from the group and delete it to the group with < button.
3. Click the Save button.

6.3.6. Group Connection Account Settings

You can set the instance account to be used for each group.

  1. Click Equipment List setting icon in home screen.

  2. Click the Account button in the Equipment List Setting.

  3. Click the Use in group checkbox of the account to be used.

You can only access the equipments with the checked account.

6.4. System setting

Click the Settings icon at the top of the EAMS web page to go to the Settings page. In Setting, you can set account management policy, terminal policy, IP control, etc.
The setting icon is displayed only to EAMS Admin.

6.4.1. EAMS License

You can register a license code that contains information on the number of users, equipment, and expiration date.
After entering the license code in the License Code field and clicking the check button, license information is displayed for a valid license.

6.4.2. Account Management Policy

Change password automatically

You can set the policy and period for automatic password management.

Sunset
Displaying the passwords of all equipment accounts

You can enable / disable it to check the password of all instances. When a user searches for a password, the action is recorded in the Event History.

Method

Password inquiry method.
EAMS WebPage: The EAMS web shows the password to the user.

Menu

Choose how you want your instance’s password to appear on the EAMS web page.
Home & Equipments : On the Home and Equipment tab, click the Password show button and all users and administrators can check the password for the instance.
Equipments : The password show button is only in the Equipment tab, so only the admin can check the password of the instance.

Unused Account Monitoring

You can set whether to activate the batch task to get the recent access log for monitoring unused accounts. Since the script is executed every 4 hours for all registered instances, select enable / disable according to the operating environment. The default setting is enable if there is no indication.

A script is run to get the lastlog of the Linux instance and the account information for each Windows instance.
Unused account monitoring is possible only when the instance users SSM service and certification type is SSM. If the instance certification type is NONE, script execution is not possible, so unused account monitoring is not possible.
Sunset

6.4.3. Terminal Settings

You can set the terminal session timeout time, file transfer, and terminal recording settings.

Terminal Session Timeout

If nothing is done within the terminal for the set time Terminal is automatically terminated.

Sunset
File transfer

This is a file upload / download function through a terminal without using a storage object.
On Windows, when uploading a file, it is saved in the "File storage path" of the EAMS server. The files stored in the EAMS server are automatically deleted through the EAMS internal batch job, but the batch job runs once a day. If a large file is stored and the capacity in the EAMS server is insufficient, the administrator can delete the file directly from "File save path".

Terminal video recording

You can configure settings for job history video files stored in EAMS.

  • Recording quality : When it is stored as a high-quality video, it takes up a lot of capacity in the EAMS server, so select and store the low quality (HD) or high quality (Full HD) in consideration of the storage capacity.

  • Video storage path : Path where video files are stored on the EAMS server. If you use a NAS, you need to change the path through EAMS technical support service.

  • Video storage period : The video file is saved for a set period. Set the period considering the storage capacity in the EAMS server.

Storage of movies and files Storage Volume

If it is set to 10%, the video is not saved any more if 10% of the capacity of the video storage path remains.

EAMS Object Storage

you can transfer large files through EAMES Object Storage.

  • Storage volume threshold: Set Threshold value to use EAMS Storage. If it is lower than the set value, the EAMS Object Storage function does not work and it operates as a basic file transfer function.

Sunset

6.4.4. IP Access Control

Set to control the IPs accessible to EAMES. Allowed IP can be registered in IP Host, Band, C Class, B Class units. There is no limit to the number of IPs that can be registered.
IPv4: input by IP host unit or band unit. ex) 1.1.1.1, 1.1.1.3-7
C class: input in C class unit. ex) 1.1.1.0
B class: input in B class unit. ex) 1.1.0.0
If IP control is activated without entering any IP information, all IPs will not be connected, so be careful.

6.4.5. Access Log Monitoring

You can set whether to use the access log function that accesses the instance using a path other than EAMS.

Access Audit
  • Unauthorized Access monitoring: The unauthorized access history feature runs the script for all instances in a batch job once a day. Select Enable if you want to use it, or Disable if you do not want to use it.

  • Secondary IP: If the IP accessed from EAMS as an instance accesses to another IP such as a private IP other than the Host IP displayed on the Home screen, it may be treated as an unauthorized access history, not through EAMS. Therefore, additionally, the IP that accesses the instance is registered in the Secondary IP category so that it can be handled as a connection by EAMS.

Sunset

6.4.6. Equipment Validation

Equipment Validation Check

This function verifies whether the instance is in account management or access, and displays the status in a green / red circle on the equipment screen. Every 10 minutes a batch job checks the status of all instances, so you can enable / disable as needed.

If the equipment status is fail, the interlocking status and equipment connection are continuously checked every 10 minutes, so if you are concerned about the server load, you can disable the function. This feature is only possible if the instance uses the SSM service and the authentication type is SSM.