feat: support browser-only connection mode for workspaces #24135
Closed
schnell3526
started this conversation in
Feature Request
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Problem
As a platform team operating Coder as a CDE for our organization, we need the ability to enforce browser-only access to workspaces for data loss prevention (DLP) purposes.
Currently, even with Premium's max port sharing level set to
owner, users can still exfiltrate data from workspaces via:coder port-forward+wget -rcoder ssh+scp/tarThere is no template-level or deployment-level option to disable these CLI connection capabilities.
Prior Art: Google Cloud Workstations
Google Cloud Workstations solves this with a single flag:
This restricts access to the Cloud Workstations Gateway (browser) only, effectively eliminating SSH and port-forward as data exfiltration vectors. Combined with VPC Service Controls and Secure Web Proxy, this provides a comprehensive DLP story.
Reference: https://cloud.google.com/workstations/docs/ssh-support
Current Workarounds and Their Limitations
/cli-authtoken copy)coder port-forward(traffic goes through Coder's tunnel)display_apps.port_forwarding_helper = falseNone of these provide a native, simple solution comparable to Cloud Workstations'
--disable-ssh-to-vm.Proposal
Add a template-level configuration option, e.g.:
When
browser_onlyis set:coder ssh→ rejected by the control planecoder port-forward→ rejected by the control planecoder_app(code-server, etc.) → allowedThis would make Coder a viable CDE option for organizations where DLP is a hard requirement, without needing third-party browser solutions.
Related
Beta Was this translation helpful? Give feedback.
All reactions