Hello again, tech tribe! ๐
This is my third blog on Identity Management, and today we're tackling Multi-Factor Authentication (MFA) โ an essential security measure to protect against credential theft, phishing, and unauthorized access.
Whether youโre managing systems on-prem or in the cloud, MFA is your front-line defense. Letโs break it down for Windows Server, Linux, and Azure AD.
๐ What is MFA?
Multi-Factor Authentication (MFA) requires users to present two or more verification methods to gain access. Itโs usually a combination of:
- Something you know (password or PIN)
- Something you have (smartphone, OTP device)
- Something you are (biometric, fingerprint, face)
๐ผ MFA on Windows Server
While older versions of Windows Server do not have native MFA, you can integrate MFA with RDP (Remote Desktop Protocol) and other services.
๐ ๏ธ Options:
Microsoft Authenticator with NPS Extension: Install the NPS Extension for Azure MFA on your Network Policy Server.
Use third-party tools like Duo Security, RSA SecureID, or Okta.
๐งฉ Key Integration Use-Cases:
RDP access to critical servers
VPN access with NPS authentication
๐ง Quick Guide: Azure MFA via NPS
Install NPS Server and NPS Extension for Azure MFA.
Register your tenant using AzureMfaNpsExtnConfigSetup.ps1.
Test using radtest or RADIUS clients.
๐ง MFA on Linux Server
MFA is not as โplug-and-playโ on Linux, but very much possible and powerful.
๐ ๏ธ Options:
Google Authenticator PAM Module
Duo Unix for SSH logins
YubiKey integration via PAM
๐ง Quick Setup: Google Authenticator for SSH
bash
sudo apt install libpam-google-authenticator
google-authenticator
Update /etc/pam.d/sshd:
swift
auth required pam_google_authenticator.so
Update /etc/ssh/sshd_config:
nginx
ChallengeResponseAuthentication yes
๐ก Time-Saver:
Use configuration management tools (e.g., Ansible, Chef) to roll out MFA setup to multiple servers.
โ๏ธ MFA in Azure Active Directory
This is the easiest and most powerful environment to enforce MFA at scale.
๐ ๏ธ Options:
Microsoft Authenticator app
SMS or Phone Call
FIDO2 Security Keys / Windows Hello
๐ง Quick Setup:
Go to Azure Portal โ Azure AD โ Security โ MFA.
Enable Per-user MFA or better, use Conditional Access Policies.
Set requirements: location, device platform, app sensitivity.
๐ก Bonus:
Use Identity Protection to trigger MFA for risky logins or unknown devices.
๐ง Developer/IT Time-Saving Benefits
๐ Quick Real-World Use Cases
A developer logging into GitLab self-hosted on Linux via SSH? โ Enforce Google Authenticator.
A system admin accessing a production Windows VM via RDP? โ Enforce Duo or Azure MFA.
A cloud engineer logging into Azure Portal? โ Enforce Conditional Access MFA policies with geolocation filters.
๐งฉ Troubleshooting Common Issues
โMFA not working after SSH configโ โ Check for ChallengeResponseAuthentication and UsePAM yes.
โUsers not receiving MFA promptsโ in Azure AD โ Ensure user registration is complete and push notifications are enabled.
โBreaking RDPโ after MFA โ Always test on a dev server or allow backup local access during rollout.
๐ Conclusion
MFA isnโt just a feature โ itโs a necessity. Itโs your low-hanging fruit to instantly boost identity security across all platforms. With minimal setup, you protect your servers, apps, and cloud environment from 90% of credential-based attacks.
๐ Next up: Privileged Access Management (PAM): Protecting Admin Accounts Like Fort Knox!
Top comments (0)