Product SiteDocumentation Site

Chapter 4. Cvičenie 3/Practice 3 - Multi-factor Authentication

4.1. Exercise
4.2. Introduction
4.3. Practice
4.3.1. Secure SSH with Google Authenticator’s Two-Factor Authentication
4.3.2. Simple SSH 2-Factor Authentication Module
4.4. Feedback

4.1. Exercise

Two-factor authentication aims to solve the decades-old problem of password-based attacks, such as brute-force attacks and key-logging attacks. In Linux, two-factor authentication can be accomplished with pam modules.