Reference Guide
Multi-Factor Authentication
Using MFA for SSH Proxy
mfa can be used as an enhanced security level for ssh proxy when the user opens an ssh client (putty, securecrt, etc ), the user is asked for their kron pam credentials to connect to the ssh proxy after the successful credential login, if mfa is activated for ssh proxy, the user is asked for an mfa token to enable mfa for ssh proxy admin and the users have the qr code, installed the kron pam mobile app, scanned the qr code with the mobile app, and mfa is enabled for the user group which will use mfa for ssh proxy establish an ssh connection to kron pam as the pamuser user edit the nsso properties file with the command below vi /pam/gui/nssoapp/conf/nsso properties check the configuration file to see if the parameter below is already configured if not, add the lines below if there is a hash ( # ) sign in front of the parameters, delete the hash ( # ) sign to activate the parameter if the parameter value is false, change it to true to type or add anything in the vi editor, first press the insert button on the keyboard, then type in the necessary line press esc to exit typing mode to save the file press esc, then colon ( ), then type in wq! , and press enter if you don’t want to save the changes on the file, press esc, then colon ( ), then type in q! , and press enter nsso connection initial otp enabled=true nsso connection initial otp cache enabled=true nsso connection initial otp cache sec=xxx (second) restart the ssh proxy with the command below systemctl restart pam ssh after these steps, otp will be required after the ssh proxy log in