| |
Setting policies for strong passwords.
Using even a relatively strong password on a critical system may not be sufficient, especially, for remote access. Two-factor authentication, configurable through PAM, is desirable.
Exercises:
Follow the tutorial on Securing SSH with two factor authentication to
set the two-factor authentication on cryptvm.
|
|