Integrating Google Authenticator with SSH logins
Finalizing
Once a secret key has been generated for every user that will need to use SSH, you must remove the nullok
option to enforce MFA. As a critical step before continuing, you must test the google-authenticator
module to make sure it is working on your system, as well as confirm that all existing users have set up secret keys and Google Authenticator on their devices. Once this step is complete, in /etc/pam.d/sshd
, change:
auth required pam_google_authenticator.so nullok
to:
auth required pam_google_authenticator.so
Then reload sshd
:
# systemctl reload sshd
Adding New Users
If you periodically add new users to the server that require SSH, these users will need to generate a key via a direct console login. If a console login is not feasible (e.g., servers running in a cloud service), then a temporary key will need to be generated by the system administrator or ideally by a user creation script. An administrator can generate a temporary key for a new user with the code in Listing 1.
Listing 1
Generating a Temporary Key
# su - new_user $ google-authenticator $ exit
Once generated, you then share the temporary secret key, QR code, or plaintext key with the user. The new user will ideally need to rerun key generation on their first login, which you can enforce with various methods such as using a flag file for new users.
Flag File Enforcement
The /etc/skel
directory contains default shell profiles and configurations that are copied into users' home directories on account creation. You will need to update /etc/skel/.profile
to check for a flag file. Flag files are empty files that are often used in shell scripts to determine how the script should behave. Append the if
block in Listing 2 to /etc/skel/.profile
.
Listing 2
Modify /etc/skel/.profile
# Run google-authenticator if a flag file exists. if [ -f $HOME/.first_login ] then google-authenticator rm -f $HOME/.first_login fi
The modification from Listing 2 will check if the flag file $HOME/.first_login
exists. If so, it will run google-authenticator
and then delete the flag file. When new users are added to the server by the administrator, the administrator can manually create the flag file in the new user's home directory with the commands in Listing 3.
Listing 3
Adding a New User and Creating a Flag
# useradd -m new_user # passwd new_user # su - new_user $ google-authenticator $ exit # touch /home/new_user/.first_login
To optionally automate this, you could create an empty flag file inside of /etc/skel
:
# touch /etc/skel/.first_login
By having the flag file inside of /etc/skel
, the flag file will be placed in the new user's home directory automatically, so the administrator will not need to touch
the flag file after creating the account.
« Previous 1 2 3 4 Next »
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.
-
Fedora 41 Beta Available with Some Interesting Additions
If you're a Fedora fan, you'll be excited to hear the beta version of the latest release is now available for testing and includes plenty of updates.
-
AlmaLinux Unveils New Hardware Certification Process
The AlmaLinux Hardware Certification Program run by the Certification Special Interest Group (SIG) aims to ensure seamless compatibility between AlmaLinux and a wide range of hardware configurations.
-
Wind River Introduces eLxr Pro Linux Solution
eLxr Pro offers an end-to-end Linux solution backed by expert commercial support.
-
Juno Tab 3 Launches with Ubuntu 24.04
Anyone looking for a full-blown Linux tablet need look no further. Juno has released the Tab 3.