Tagged articles
8 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Jan 24, 2025 · Information Security

Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide

This tutorial explains how to enhance SSH security by integrating Google Authenticator for two‑factor authentication, covering SSH basics, Google Authenticator overview, Linux installation steps, PAM configuration, client setup on Android, browsers, and Python, with complete command examples.

Google AuthenticatorLinuxSSH
0 likes · 9 min read
Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide
Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Selected Java Interview Questions
Selected Java Interview Questions
May 25, 2023 · Information Security

Implementing Two-Factor Authentication in Spring Security with Google Authenticator, Authy, and Custom TOTP

This article explains how to add two‑factor authentication to a Spring Security‑based Java web application by integrating Google Authenticator, Authy, or a custom TOTP module, covering required dependencies, service implementations, security configuration, and testing procedures.

AuthyGoogle AuthenticatorTwo-Factor Authentication
0 likes · 29 min read
Implementing Two-Factor Authentication in Spring Security with Google Authenticator, Authy, and Custom TOTP
Open Source Linux
Open Source Linux
Dec 28, 2021 · Information Security

Secure Your Linux Server with Google Authenticator Two-Factor Authentication: A Complete Guide

This guide walks you through installing PAM modules, generating Google Authenticator codes, configuring SSH and sudo for two-factor authentication, setting up Fail2ban to block brute-force attempts, and recovering from lockouts, providing all commands and configuration steps for a hardened Linux server.

Fail2banGoogle AuthenticatorTwo-Factor Authentication
0 likes · 5 min read
Secure Your Linux Server with Google Authenticator Two-Factor Authentication: A Complete Guide
php Courses
php Courses
Jul 12, 2021 · Information Security

Implementing Google Authenticator 2FA in PHP (ThinkPHP 6)

This tutorial explains how to download, configure, and use the PHP GoogleAuthenticator class for two‑factor authentication in a ThinkPHP 6 environment, including code examples for generating secrets, QR‑code URLs, storing them, and verifying user tokens.

2FAAuthenticationGoogle Authenticator
0 likes · 9 min read
Implementing Google Authenticator 2FA in PHP (ThinkPHP 6)
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2014 · Information Security

Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup

This tutorial explains how to protect SSH logins by installing Google Authenticator, generating a secret key, configuring PAM and sshd, and using an Android device to provide time‑based one‑time passwords, complete with installation commands, troubleshooting tips, and verification steps.

Google AuthenticatorLinuxSSH
0 likes · 8 min read
Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup