ATM, I would be happy with either. I will probably use 2 factor however until 1 factor works, I am unconcerned.
network-marvels wrote:
Also, irrespective of single factor or two factor authentication, edit the sshd configuration file “/etc/ssh/sshd_config” to disable challenge-response passwords. Change “challenge-response passwords yes” to “challenge-response passwords no” from the “/etc/ssh/sshd_config” file.
We would appreciate if you can make the above mentioned changes and test again.
I know this one fairly well.
ssh 192.168.1.5 -p 32123 -l user
Permission denied (publickey).
I was seeing many comments that yes was required. I did notice on this pass looking at the logs
kcheckpass: pam_unix2(xdm:auth): Unknown option: `try_first_pass`
kcheckpass:pam_unix2(xdm:setcred): Unknown option: `try_first_pass`
sshd: Received signal 15: terminating
I'll look more into that when I wake up again.
Thanks.
To answer OP: Unless you are running your own authentication server then you will be authorizing off Yubico's. For SSH, that shouldn't be too much of an issue (unless their auth server is down). It sounds like you wanted to do it for your main login, there could be issues with that (since your inet reliability comes into play there as to whether you can use your comp)
Someone can correct me if I'm wrong.