Use cases — SSH, SFTP, RDP & VNC for macOS
SSH jump host workflows on Mac
Set up bastions visually, reuse across profiles, agent-forward to private networks — without `~/.ssh/config` mass-editing.
Anyone who works with cloud infrastructure or hardened on-prem networks knows the bastion (jump host) pattern: one Internet-exposed SSH server with strong logging and 2FA, every other host reachable only through it. The OpenSSH `ProxyJump` directive (or older `ProxyCommand` with `nc`) handles the multi-hop SSH connection. SSHive makes this a UI — set up the bastion as a profile once, and every other profile just selects "Jump Host: bastion" from a dropdown. Change the bastion's IP later? Edit one profile, every dependent connection adapts.
Set up a bastion profile
Create the bastion as a normal SSH profile in SSHive: hostname, port, user, key. Connect once to verify and accept the host key. Mark this profile as "Bastion / Jump Host" in profile settings — this surfaces it in the Jump Host dropdown of other profiles. Optionally enable "Agent forwarding" if you'll need to authenticate to subsequent hops with the same key.
Use the bastion in downstream profiles
Create a profile for the private host: enter its private IP, user, key. Find "Jump Host" section, select your bastion. Save. Click connect — SSHive establishes the SSH tunnel to the bastion, then opens a second SSH session through it to the private host. From your perspective, it's one click; under the hood, it's OpenSSH ProxyJump.
Frequently asked questions
Can I chain multiple jump hosts?+
Yes — each profile can specify a Jump Host, including a profile that itself uses a Jump Host. So host C jumps through B, which jumps through A. SSHive resolves the chain automatically.
Does agent forwarding work through SSHive?+
Yes — enable "Forward agent" in the bastion profile. Your local ssh-agent (or 1Password's SSH agent) is forwarded to the bastion, and the second-hop SSH connection uses your local key without your private key ever touching the bastion.
Related SSHive features
Step-by-step guides
How to use a jump host on a Mac
Visual ProxyJump configuration, agent forwarding, multi-hop chains — without editing ~/.ssh/config every time.
How to set up an SSH tunnel on a Mac
A complete guide to local, remote, and SOCKS5 SSH tunnels on macOS — both command-line and visually in SSHive.
How to generate and use SSH keys on a Mac
From `ssh-keygen` to passwordless servers in 5 minutes — covers ed25519, ssh-agent, the Apple Keychain, and SSHive integration.
Try SSHive Free for macOS
Get the all-in-one SSH, SFTP, RDP and VNC client for Mac. Free download, no signup required.