We have previously covered how to add Time-based One-time Password Algorithm (TOTP) on your mobile device. Now we can implement SSH access with TOTP. It is more secure to use public key authentication, and disable any password and challenge-based authentication for SSH. However, there are times when you have to have access to your server but you don’t have your public keys with you. In this case, we’ll need to allow root …
Scaling tips, insights, updates, culture, and more from our Server Experts.
Comments Off on Implementing TOTP Authentication Into Your Infrastructure