shlogg · Early preview
Ibrahim S @ibrahimsi

Secure Remote Access With SSH: Beyond Login And Command Execution

SSH allows secure communication between computers over internet, enabling file sharing, control & command-line execution. Configure MFA in PAM, update SSH config & restart service to enable 2-factor auth.

SSH is a protocol that allows us to communicate between two computers over the internet (share files, control, or modify remote computers). Its most notable applications are remote login and command-line execution.
Here is the step-by-step process:

Install Google Authenticator
Configure MFA in PAM
Update SSH Configuration
Test the setup by logging in again using SSH.

The first step was to install the PAM module for Google Authenticator, which enables Time-based One-Time Passwords (TOTP).
 sudo apt update && sudo apt install libpam-google-authenticator 
 google-authenticator
This generated a...