Posted On: Nov 14, 2022

Today, we are pleased to announce the general availability of an IoT Device Management feature, browser-based SSH (secure shell) using Secure Tunneling. Secure Tunneling provides customers a secure connection between source and destination devices that are brokered through a cloud proxy service on AWS. To provide secure bi-directional communication between devices, tunnels are authenticated with the cloud proxy service and data transmitted through the tunnel is encrypted using Transport Layer Security (TLS). With browser-based SSH, customers can open a SSH tunnel to a targeted device directly from the AWS console and use an embedded terminal without the need for a local proxy. This feature simplifies the onboarding experience significantly because customers no longer need to compile and install a local proxy on the operators' device. This streamlined experience allows customers to easily scale their use of Secure Tunneling for remote tasks such as troubleshooting or conducting routine operational maintenance.

The Browser-based SSH using Secure Tunneling can be used in all AWS Regions where AWS IoT Device Management is available. To learn more about Secure Tunneling and the browser-based SSH, refer to AWS IoT Device Management Secure Tunneling documentation and the browser-based SSH documentation, or checkout this blog for a walkthrough.