How to Setup Two-Factor Authentication For SSH In Linux

By default, SSH already uses secure data communication between remote machines, but if you want to add some extra security layer to your SSH connections, you can add a Google Authenticator (two-factor authentication) module that allows you to enter a random one-time password (TOTP) verification code while connecting to SSH servers. You’ll have to enter the verification code from your smartphone or PC when you connect.

The Google Authenticator is an open-source module that includes implementations of one-time passcodes (TOTP) verification tokens developed by Google.

It supports several mobile platforms, as well as PAM (Pluggable Authentication Module). These one-time passcodes are generated using open standards created by the OATH Initiative for Open Authentication).

In this article, I will show you how to set up and configure SSH for two-factor authentication under RedHat-based and Debian-based Linux distributions such as Fedora, CentOS Stream, Rocky Linux, and AlmaLinux, Ubuntu, Debian, and Mint.

Installing Google Authenticator in Linux

Open the machine that you want to set up two-factor authentication and install the following PAM libraries along with development libraries that are needed for the PAM module to work correctly with the Google authenticator module.

On RedHat-based systems install the ‘pam-devel‘ package using the following yum command.

# yum install google-authenticator -y

On Debian-based systems install the ‘libpam0g-dev‘ package using the following apt command.

$ sudo apt install libpam-google-authenticator -y

Generate Google Authentication Tokens

Once you run the ‘google-authenticator‘ command, it will prompt you with a series of questions.

# google-authenticator

Simply type “y” (yes) as the answer in most situations. If something goes wrong, you can type again the ‘google-authenticator‘ command to reset the settings.

  • Do you want authentication tokens to be time-based (y/n) y

After this question, you will get your ‘secret key‘ and ‘emergency codes‘. Write down these details somewhere, we will need the ‘secret key‘ later on to set up the Google Authenticator app.

# google-authenticator

Do you want authentication tokens to be time-based (y/n) y
Warning: pasting the following URL into your browser exposes the OTP secret to Google:
  https://www.google.com/chart?chs=200x200&chld=M|0&cht=qr&chl=otpauth://totp/[email protected]%3Fsecret%3DCYZF2YF7HFGX55ZEPQYLHOO5JM%26issuer%3Dtecmint
Failed to use libqrencode to show QR code visually for scanning.
Consider typing the OTP secret into your app manually.
Your new secret key is: CYZF2YF7HFGX55ZEPQYLHOM
Enter code from app (-1 to skip): -1 Code confirmation skipped Your emergency scratch codes are: 83714291 53083200 80975623 57217008 77496339

Next, follow the setup wizard and in most cases type the answer as “y” (yes) as shown below.

Do you want me to update your "/root/.google_authenticator" file (y/n) y Do you want to disallow multiple uses of the same authentication token? This restricts you to one login about every 30s, but it increases your chances to notice or even prevent man-in-the-middle attacks (y/n) y By default, tokens are good for 30 seconds and in order to compensate for possible time-skew between the client and the server, we allow an extra token before and after the current time. If you experience problems with poor time synchronization, you can increase the window from its default size of 1:30min to about 4min. Do you want to do so (y/n) y If the computer that you are logging into isn't hardened against brute-force login attempts, you can enable rate-limiting for the authentication module. By default, this limits attackers to no more than 3 login attempts every 30s. Do you want to enable rate-limiting (y/n) y
Generate Google Auth Tokens
Generate Google Auth Tokens

Configuring SSH to Use Google Authenticator in Linux

Open the PAM configuration file ‘/etc/pam.d/sshd‘ and add the following line to the bottom of the file.

auth required pam_google_authenticator.so nullok
auth required pam_permit.so
Configure PAM for SSH
Configure PAM for SSH

Next, open the SSH configuration file ‘/etc/ssh/sshd_config‘ and scroll down to find the line that says.

ChallengeResponseAuthentication no

Change it to “yes“. So, it becomes like this.

ChallengeResponseAuthentication yes
Configure SSH for Google Auth
Configure SSH for Google Auth

Finally, restart the SSH service to take new changes.

# systemctl restart sshd
Or
$ sudo systemctl restart sshd

Configuring Google Authenticator App

Launch the Google Authenticator app on your smartphone. Press + and choose “Enter a setup key“. If you don’t have this app, you can download and install the Google Authenticator app on your Android/iPhone/Blackberry devices.

Add your account ‘Name‘ and enter the ‘secret key‘ generated earlier.

SSH Secret Key
SSH Secret Key

It will generate a one-time password (verification code) that will constantly change every 30sec on your phone.

SSH Google Auth Code
SSH Google Auth Code

Now try to log in via SSH, you will be prompted with a Google Authenticator code (Verification code) and Password whenever you attempt to log in via SSH. You have only 30 seconds to enter this verification code, if you miss it will regenerate a new verification code.

login as: tecmint
Access denied
Using keyboard-interactive authentication.
Verification code:
Using keyboard-interactive authentication.
Password:
Last login: Tue Apr 23 13:58:29 2022 from 172.16.25.125
[[email protected] ~]#

If you don’t have a smartphone, you can also use a Firefox add-on called Authenticator to do two-factor authentication.

Important: The two-factor authentication works with password-based SSH login. If you are using any private/public key SSH session, it will ignore two-factor authentication and log you in directly.

If you liked this article, then do subscribe to email alerts for Linux tutorials. If you have any questions or doubts? do ask for help in the comments section.

If You Appreciate What We Do Here On TecMint, You Should Consider:

TecMint is the fastest growing and most trusted community site for any kind of Linux Articles, Guides and Books on the web. Millions of people visit TecMint! to search or browse the thousands of published articles available FREELY to all.

If you like what you are reading, please consider buying us a coffee ( or 2 ) as a token of appreciation.

Support Us

We are thankful for your never ending support.

21 thoughts on “How to Setup Two-Factor Authentication For SSH In Linux”

  1. When a normal user runs google_authenticator the secret file .google_authenticator is owned by the root.

    -r--------. 1 root nogroup 117 Sep 27 12:29 .google_authenticator
    

    In /var/log/secure I see :

    Sep 27 12:21:30 localhost sshd(pam_google_authenticator)[8475]: Secret file “/user/undergrads/John/.ssh/google_authenticator” must be owned by “John”
    

    I have:
    Rocky Linux 8.6
    google-authenticator-1.07-1.el8.x86_64

    Reply
  2. I’ve tried the command lines for Google Authenticator recently (Linux Mint 19.1) and found they do not work. upon entering I receive ‘command not found‘ which stands to reason when the OP was in 2013. I can create a pam file but it does not ‘trigger’ a response on boot…. i.e. no requirement for a password other than the one I created on install.

    Reply
  3. It works for me. Thanks.

    I request you to write a blog that how we can Integrate Apache with Google authentication

    Reply

Got something to say? Join the discussion.

Have a question or suggestion? Please leave a comment to start the discussion. Please keep in mind that all comments are moderated and your email address will NOT be published.