Zuletzt aktualisiert am 30. Juli 2024
Rublon schützt Ihre entfernten und lokalen Linux SSH und Desktop Anmeldungen
Rublon MFA for Linux SSH
Supported Linux distributions
- Ubuntu 20.04 (Focal Fossa)
- Ubuntu 22.04 (Jammy Jellyfish)
- Ubuntu 24.04 (Noble Numbat)
- Debian 11 (Bullseye)
- Debian 12 (Bookworm)
Enforce Control Over Your Linux MFA SSH Logins
Introduction
Challenge
- Linux SSH
- Array AG SSL VPN
- MikroTik VPN
- Logins to Linux SSH should be bypassed for users logging in from the following IP address range: 17.5.100.0-17.5.100.50.
- Only Mobile Push, Email Link, and SMS Passcode should be active authentication methods for users logging in to Linux SSH.
- Logins to other applications should not be bypassed regardless of the user’s IP address.
- All authentication methods should be active for users logging in to WordPress or MikroTik VPN.
Solution
- Create a new Custom Policy named Linux SSH Policy.
- Click Authentication Methods and check Mobile Push, Email Link, and SMS Passcode. Uncheck every other method of authentication if necessary.
- Click Authorized Networks and type 17.5.100.0-17.5.100.50 in the text field.
- Click Save to create your Linux SSH Policy.
- Go to Applications, and assign Linux SSH Policy to your Linux SSH application.
- Create a new Custom Policy named VPNs Policy.
- Enable all authentication methods in your VPN Policy policy while leaving the Authorized Networks field empty.
- Click Save to create your VPNs Policy.
- Go to Applications, and assign VPNs Policy to your Array SSL AG VPN and MikroTik VPN applications.