SSH Two-Factor Authentication

10+
shkarkime
Vlerësimi i përmbajtjes
Të gjithë
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit
Imazhi i pamjes së ekranit

Rreth këtij aplikacioni

This Application is designed for SSH Two Factor Authentication.
Easy and Secure way to protect servers from unauthorized access.

WARNING:
** For: System-Administrators
** Needs 3rd party Software to be installed

Please note that this application requires internet on both side for full feature.

About the application:
- This is application is intended to a second-level security top on SSH access.
- Therefore this application invoked if a successfully login made through SSH.

How is it work?
- You only need to compile and install one .cpp file, then one extra line at end of sshd_config file.
- Once a successfully SSH login made the binary file invoked and temporarily replaces any shell, so the two factor mechanism starts at this point.
- Simply open your app in your phone and the permission will be asked by prompt.

According to GDPR rules and other privacy policy, that you can read detailed below, this service may store private informations such as phone model, datetime, login attempts, ip address and email account. We store informations highly secured and encrypted. Also we uses hard encryptions please make sure you that your country allowing use of encryption.

Features:
- Work with any type of shell, supports sftp and rsync as well.
- Logging any login attempts
- (new) Grouping, you can now share the whole group between accounts
- (new) 3 types of authentication mechanisms, Permissive, Strict, Disabled
- Permissive: Allow now and for last 6 hours any type of login with same IP and Group.
- Strict: Always needs verification
- Disabled: Two-Factor Authentication disabled but logged.
- This application technically can not see any SSH passwords.
- However this application is top of SSH layer but totally independent so cannot be use as backdoor and does not replace any SSH functions.

Why is this very usefull?
- 99% of successfull 'ssh-break-in' attack can be mitigated
- Logs. and these kind of logs are independent.
- Does not slow you down, you don't need to be authenticated all time
- Account based authentication so if you lost your device just login again

Always write-down your emergency keys and test it to avoid lockout yourself.
There is a Offline Authentication if you have network issues by time challenge which can be adjusted.

** Attention, this software currently in BETA phase, it may contains bugs **
Përditësuar më
11 tet 2021

Siguria e të dhënave

Siguria fillon me njohjen e mënyrës se si i mbledhin dhe i ndajnë zhvilluesit të dhënat e tua. Praktikat për privatësinë dhe sigurinë e të dhënave mund të variojnë bazuar në përdorimin, rajonin dhe moshën tënde. Këto informacione janë dhënë nga zhvilluesi dhe ato mund të përditësohen me kalimin e kohës.
Nuk ndahen të dhëna me palë të treta
Mëso më shumë për mënyrën se si e deklarojnë zhvilluesit ndarjen e të dhënave
Ky aplikacion mund të mbledhë këto lloje të dhënash
Informacionet personale, Aktiviteti i aplikacionit dhe 2 lloje të tjera
Të dhënat janë enkriptuar gjatë transferimit
Mund të kërkosh që të dhënat të fshihen

Ç'të reja ka

Supports newest phones

Mbështetja e aplikacionit

Rreth zhvilluesit
Hlavaji Viktor
davies@npulse.net
Budapest Kisvárda utca 11 1171 Hungary
undefined