{"id":2203,"date":"2025-04-21T12:56:11","date_gmt":"2025-04-21T09:56:11","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/"},"modified":"2025-04-21T12:56:11","modified_gmt":"2025-04-21T09:56:11","slug":"securing-ssh-access-with-multi-factor-authentication-on-linux-servers","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/","title":{"rendered":"Securing SSH Access with Multi-Factor Authentication on Linux Servers"},"content":{"rendered":"\n<h3>Securing SSH Access with Multi-Factor Authentication on Linux Servers<\/h3>\n<p><\/p>\n<p>As businesses and organizations increasingly rely on remote servers for their operations, ensuring secure access to these servers has never been more critical. SSH (Secure Shell) is the standard protocol for remote administration of Linux servers, but it can also be a target for malicious actors. To bolster security, implementing Multi-Factor Authentication (MFA) is an effective measure that adds an extra layer of protection. In this article, we will explore how to secure SSH access using MFA on Linux servers.<\/p>\n<p><\/p>\n<h4>Understanding the Basics of SSH and MFA<\/h4>\n<p><\/p>\n<p><strong>SSH (Secure Shell)<\/strong> is widely used for securely accessing remote machines. It relies on a combination of public and private keys, usernames, and passwords for authentication. However, passwords can be vulnerable to brute-force attacks and phishing attempts.<\/p>\n<p><\/p>\n<p><strong>Multi-Factor Authentication (MFA)<\/strong> is a security mechanism that requires users to provide multiple forms of identification before granting access. This typically involves something you know (a password), something you have (a mobile device or security key), and sometimes something you are (biometric identification).<\/p>\n<p><\/p>\n<h4>Why Use MFA for SSH Access?<\/h4>\n<p><\/p>\n<ol><\/p>\n<li><strong>Enhanced Security<\/strong>: Even if an attacker manages to obtain a user&#8217;s password, they would still need the second factor to gain access.<\/li>\n<p><\/p>\n<li><strong>Compliance Requirements<\/strong>: Many industries have regulations that require MFA for sensitive systems.<\/li>\n<p><\/p>\n<li><strong>Mitigation against Credential Theft<\/strong>: With phishing attacks on the rise, MFA provides an additional barrier against unauthorized access.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h4>Prerequisites<\/h4>\n<p><\/p>\n<p>Before implementing MFA with SSH, ensure the following are in place:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>A Linux server with SSH access.<\/li>\n<p><\/p>\n<li><strong>sudo<\/strong> privileges on the server.<\/li>\n<p><\/p>\n<li><strong>Google Authenticator<\/strong> or a similar MFA application installed on your mobile device.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h4>Step-by-Step Guide to Enable MFA on SSH<\/h4>\n<p><\/p>\n<p><strong>Step 1: Install Required Packages<\/strong><\/p>\n<p><\/p>\n<p>To enable MFA, we&#8217;ll use the <code>libpam-google-authenticator<\/code> package. Install this on your server with the following command:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt-get update<br \/>\nsudo apt-get install libpam-google-authenticator<\/code><\/pre>\n<p><\/p>\n<p><strong>Step 2: Configure the Google Authenticator<\/strong><\/p>\n<p><\/p>\n<p>Run the following command to create a new 2FA token for your user:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">google-authenticator<\/code><\/pre>\n<p><\/p>\n<p>You&#8217;ll see several prompts. Here\u2019s what they mean:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Do you want authentication tokens to be time-based?<\/strong> Enter <code>y<\/code>.<\/li>\n<p><\/p>\n<li><strong>Secret key<\/strong>: This will be your unique secret key. Make sure to note it down.<\/li>\n<p><\/p>\n<li><strong>Verification code<\/strong>: Input the code generated to verify.<\/li>\n<p><\/p>\n<li><strong>Emergency scratch codes<\/strong>: These are backup codes if you lose access to your Authenticator app.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>You will also receive an option to update your <code>.google_authenticator<\/code> file. Keep this file secure, as it contains crucial authentication information.<\/p>\n<p><\/p>\n<p><strong>Step 3: Update SSH Configuration<\/strong><\/p>\n<p><\/p>\n<p>Open the SSH configuration file:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/ssh\/sshd_config<\/code><\/pre>\n<p><\/p>\n<p>Find and modify the following lines:<\/p>\n<p><\/p>\n<pre><code class=\"language-plaintext\">ChallengeResponseAuthentication yes<\/code><\/pre>\n<p><\/p>\n<p>Make sure the following line is present (if not, add it):<\/p>\n<p><\/p>\n<pre><code class=\"language-plaintext\">UsePAM yes<\/code><\/pre>\n<p><\/p>\n<p>This directs SSH to use PAM (Pluggable Authentication Modules) for authentication.<\/p>\n<p><\/p>\n<p><strong>Step 4: Configure PAM<\/strong><\/p>\n<p><\/p>\n<p>Edit the PAM configuration file for SSH:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo nano \/etc\/pam.d\/sshd<\/code><\/pre>\n<p><\/p>\n<p>Add the following line to the end of the file:<\/p>\n<p><\/p>\n<pre><code class=\"language-plaintext\">auth required pam_google_authenticator.so<\/code><\/pre>\n<p><\/p>\n<p>This instructs PAM to require the Google Authenticator token for SSH logins.<\/p>\n<p><\/p>\n<p><strong>Step 5: Restart SSH Service<\/strong><\/p>\n<p><\/p>\n<p>After making your changes, restart the SSH service to apply the configuration:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo systemctl restart sshd<\/code><\/pre>\n<p><\/p>\n<h4>Step 6: Test the Configuration<\/h4>\n<p><\/p>\n<ol><\/p>\n<li>Open a new terminal session and try to SSH into your server.<\/li>\n<p><\/p>\n<li>You should be prompted for your regular username and password first.<\/li>\n<p><\/p>\n<li>After entering the correct username and password, you\u2019ll be prompted to enter the verification code from the Google Authenticator app.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h4>Troubleshooting Tips<\/h4>\n<p><\/p>\n<ul><\/p>\n<li><strong>Access Issues<\/strong>: If you encounter issues logging in, ensure you have backup access (such as a console or direct access).<\/li>\n<p><\/p>\n<li><strong>Incorrect Time Settings<\/strong>: MFA relies on time synchronization, so ensure your server time is accurate. Consider using NTP service for synchronization.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h4>Conclusion<\/h4>\n<p><\/p>\n<p>Implementing Multi-Factor Authentication for SSH access significantly strengthens the security posture of your Linux server. As cyber threats evolve, it is imperative for organizations to adopt robust methodologies to safeguard their infrastructure. By following this guide, you can enhance your server&#8217;s security and protect sensitive data from unauthorized access.<\/p>\n<p><\/p>\n<p>For more tech-savvy solutions and articles, stay tuned to WafaTech for the latest insights on cybersecurity and system administration!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Securing SSH Access with Multi-Factor Authentication on Linux Servers As businesses and organizations increasingly rely on remote servers for their operations, ensuring secure access to these servers has never been more critical. SSH (Secure Shell) is the standard protocol for remote administration of Linux servers, but it can also be a target for malicious actors. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2204,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[273,278,265,277,264,302,770],"class_list":["post-2203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-access","tag-authentication","tag-linux","tag-multifactor","tag-securing","tag-servers","tag-ssh","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing SSH Access with Multi-Factor Authentication on Linux Servers - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Securing SSH Access with Multi-Factor Authentication on Linux Servers %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing SSH Access with Multi-Factor Authentication on Linux Servers\" \/>\n<meta property=\"og:description\" content=\"Securing SSH Access with Multi-Factor Authentication on Linux Servers %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-21T09:56:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Securing SSH Access with Multi-Factor Authentication on Linux Servers\",\"datePublished\":\"2025-04-21T09:56:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/\"},\"wordCount\":650,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png\",\"keywords\":[\"Access\",\"Authentication\",\"Linux\",\"MultiFactor\",\"Securing\",\"Servers\",\"SSH\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/\",\"name\":\"Securing SSH Access with Multi-Factor Authentication on Linux Servers - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png\",\"datePublished\":\"2025-04-21T09:56:11+00:00\",\"description\":\"Securing SSH Access with Multi-Factor Authentication on Linux Servers %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server enabling multi-factor authentication in SSH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing SSH Access with Multi-Factor Authentication on Linux Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing SSH Access with Multi-Factor Authentication on Linux Servers - WafaTech Blogs","description":"Securing SSH Access with Multi-Factor Authentication on Linux Servers %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/","og_locale":"en_US","og_type":"article","og_title":"Securing SSH Access with Multi-Factor Authentication on Linux Servers","og_description":"Securing SSH Access with Multi-Factor Authentication on Linux Servers %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-04-21T09:56:11+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Securing SSH Access with Multi-Factor Authentication on Linux Servers","datePublished":"2025-04-21T09:56:11+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/"},"wordCount":650,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png","keywords":["Access","Authentication","Linux","MultiFactor","Securing","Servers","SSH"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/","name":"Securing SSH Access with Multi-Factor Authentication on Linux Servers - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png","datePublished":"2025-04-21T09:56:11+00:00","description":"Securing SSH Access with Multi-Factor Authentication on Linux Servers %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png","width":1024,"height":1024,"caption":"linux server enabling multi-factor authentication in SSH"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-ssh-access-with-multi-factor-authentication-on-linux-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing SSH Access with Multi-Factor Authentication on Linux Servers"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/04\/Securing-SSH-Access-with-Multi-Factor-Authentication-on-Linux-Servers.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2203"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2204"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}