Prev
bvi
Next
Chapter 4. Cvičenie 3/Practice 3 - Multi-factor Authentication
4.1. Exercise
4.2. Introduction
4.3. Practice
4.3.1. Secure SSH with Google Authenticator’s Two-Factor Authentication
4.3.2. Simple SSH 2-Factor Authentication Module
4.4. Feedback
4.1. Exercise
Two-factor authentication aims to solve the decades-old problem of password-based attacks, such as brute-force attacks and key-logging attacks. In Linux, two-factor authentication can be accomplished with pam modules.
Prev
3.5. Spätná väzba
Up
Home
Next
4.2. Introduction