1 min read

Configure SSH Google Two factor (2FA) Authentication on CentOS / RHEL


đź’ˇ
lets configure google authenticator over ssh access
sudo yum -y install google-authenticator qrencode

install

$ sudo vi /etc/pam.d/sshd 

edit sshd file

auth required pam_google_authenticator.so

$ sudo /etc/ssh/sshd_config

ChallengeResponseAuthentication yes
type in terminal :  google-authenticator

This will ask you a series of questions, here is a recommended configuration:

  • Use “time-based” time-based tokens: yes
  • Update the .google_authenticator file: yes
  • Disallow multiple uses of the same authentication token: yes
  • Increase the original generation time limit: no
  • Enable rate-limiting: yes
Your new secret key is: F298F23FJ230F9JSHXXXXXX
Your verification code is 142XXX
Your emergency scratch codes are:

 1345XXXX
 6526XXXX
 3893XXXX
 2457XXXX
 6000XXXX

You’ll be given secret key, verification code and emergency scratch codes to be used if you don’t have access to your phone. Write them down on paper or notepad and keep them safe.

sudo systemctl restart sshd

Restart sshd service on the server

Next login will require you to pass given code in Auth App