Last updated on September 1, 2025
Rublon Safeguards Your Remote and Local Linux SSH and Desktop Logins
Rublon MFA for Linux SSH
Supported Linux distributions
- Debian (11, 12)
- Ubuntu (18.04, 20.04, 22.04, 24.04)
- Red Hat / CentOS / Alma / Rocky (8, 9)
- openSUSE Leap / SUSE Linux Enterprise Server 15 SP3
Enforce Control Over Your Linux MFA SSH Logins
Introduction
Challenge
- Linux SSH
- Array AG SSL VPN
- MikroTik VPN
- Logins to Linux SSH should be bypassed for users logging in from the following IP address range: 17.5.100.0-17.5.100.50.
- Only Mobile Push, Email Link, and SMS Passcode should be active authentication methods for users logging in to Linux SSH.
- Logins to other applications should not be bypassed regardless of the user’s IP address.
- All authentication methods should be active for users logging in to WordPress or MikroTik VPN.
Solution
- Create a new Custom Policy named Linux SSH Policy.
- Click Authentication Methods and check Mobile Push, Email Link, and SMS Passcode. Uncheck every other method of authentication if necessary.
- Click Authorized Networks and type 17.5.100.0-17.5.100.50 in the text field.
- Click Save to create your Linux SSH Policy.
- Go to Applications, and assign Linux SSH Policy to your Linux SSH application.
- Create a new Custom Policy named VPNs Policy.
- Enable all authentication methods in your VPN Policy policy while leaving the Authorized Networks field empty.
- Click Save to create your VPNs Policy.
- Go to Applications, and assign VPNs Policy to your Array SSL AG VPN and MikroTik VPN applications.