![]() You need to save this information to a vault for future reference. Next, a QR code will be displayed on the terminal as shown below and right below it, some information will be displayed. These tokens are considered more secure than non-time-based tokens, and therefore, type 'y' for yes and hit ENTER. By default, this is after 30 secs, upon which a new set of tokens is generated. Time-based authentication tokens expire after a certain time. ![]() First, you will be asked if you want authentication tokens to be time-based. This will evoke a couple of questions on your terminal screen. Now, run the command below to initialize PAM. auth required pam_google_authenticator.so $ sudo vim /etc/pam.d/common-authĪppend the line below to the file as indicated. With the Google Authenticator app in place, we will proceed and configure the Google PAM package on Ubuntu by modifying the /etc/pam.d/common-auth file as shown. Google Authenticator Step 3: Configure Google PAM in Ubuntu The app will present you with a 6 digit OTP code that auto-renews every 30 seconds. ![]() ![]() Install Google PAM in Ubuntu Step 2: Install Google Authenticator App on Your SmartphoneĪdditionally, you need to install the Google Authenticator application on your tablet or smartphone. When prompted, hit 'Y' and press ENTER to continue with the installation. The package is hosted on the Ubuntu repository, so proceed and use the apt command to install it as follows: $ sudo apt install libpam-google-authenticator PAM, an abbreviation for Pluggable Authentication Module, is a mechanism that provides an extra layer of authentication on the Linux platform. Step 1: Install Google’s PAM Packageįirst off, install the Google PAM package. ![]() In this guide, we demonstrate how you can use Two-Factor Authentication with Ubuntu. Nowadays multiple companies such as Google, Facebook, Twitter, and AWS, to mention a few provide users the choice of setting up MFA to further protect their accounts. For this reason, any company or entity that takes security seriously needs to implement 2-Factor authentication.Ĭolloquially known as MFA ( Multi-Factor Authentication), 2-Factor authentication provides an extra layer of security that requires users to provides certain details such as codes, or OTP ( One Time Password) before or after authenticating with the usual username and password. Usernames and passwords can easily be cracked using a plethora of hacking tools, leaving your system vulnerable to breaches. Over time, the traditional username and password authentication has proven inadequate in providing robust security to applications and systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |