User Management
Manage chrooted SFTP users, SSH keys, password aging, and ownership so every integration has an accountable access path.
SFTP users, firewall, and compliance in one terminal app
Many companies use SFTP to exchange data safely. sftp-jailer gives operators a user-friendly terminal interface to create chrooted users, manage SSH keys and password aging, allow fixed partner IP addresses, inspect logs, and tighten firewall access step by step.
Self-hosted Open Source tooling for progressive IP-allowlist lockdown and compliance evidence.
Problem
Permissive firewall rules, stale SSH keys, unmanaged users, unclear source IP ownership, and weak audit visibility add up over time. sftp-jailer gives operators a path from permissive legacy access to reviewed per-user source IP allowlists without guessing which partner traffic still needs to work.
Before
Permissive legacy SFTP access
After
Reviewed per-user source IP allowlists
Workflow
Learning mode observes existing source IPs before enforcement so teams can migrate without breaking partner transfers.
Operators connect observed source IPs with users and SSH keys before anything becomes trusted.
Approved per-user source IPs become the allowlist that defines who may connect.
sftp-jailer configures firewall rules from reviewed allowlists and fits inside existing firewall governance.
Operational logs and visibility show what is active without implying formal compliance certification.
DMZ fit
sftp-jailer fits a DMZ SFTP host with managed source IP access and firewall enforcement boundaries. It configures firewall rules from reviewed allowlists and fits inside existing firewall governance.
Platform and source
Ubuntu 24.04 LTS and Debian 13 (Trixie) are the initial supported platforms.
More Linux distributions can be supported upon request after testing.
Inspect the Go source on GitHub