Require MFA (Duo, FIDO2, push notification, biometrics) for every SSH session to Linux servers. Enforce your IdP's MFA policies on SSH without per-server configuration. Deploy via local agent or gateway SSH proxy.
Why MFA for SSH Is Critical
Multi-factor authentication for SSH remains one of the most difficult security controls to implement at scale. Traditional approaches require configuring each Linux server individually. Configuration drift, module conflicts, and upgrade breakage make this approach operationally painful. Many organizations give up and accept SSH key-only authentication — which provides no MFA whatsoever. OnePAM eliminates per-server MFA configuration by centralizing MFA enforcement at the identity layer. When users SSH to a server, OnePAM authenticates them via your corporate IdP (Okta, Azure AD, Google Workspace), which enforces its MFA policies — Duo push, FIDO2 security keys, biometrics, TOTP, or SMS. The same MFA policies you enforce for SaaS applications now apply to SSH. No per-server TOTP seeds. No configuration drift. One MFA policy from your IdP, enforced on every SSH session across your entire fleet.
Local Agent
The agent triggers IdP MFA during SSH authentication. Users complete MFA via their phone or security key. No per-server TOTP configuration.
Gateway SSH Proxy
The gateway enforces MFA before proxying SSH connections. MFA happens at the gateway — no server-side MFA configuration needed. Works with any server.
SSH Without MFA — The Risks
Without identity-based SSH access, these risks threaten your servers every day.
SSH Security Challenges
These are the risks organizations face with traditional SSH authentication.
Per-Server MFA Configuration
Traditional SSH MFA requires configuring each server individually. At 100+ servers, this is operationally prohibitive.
Configuration Drift
MFA configurations diverge across servers over time. Some servers have outdated settings, broken configurations, or bypassed MFA — creating inconsistent security.
TOTP Seed Management
Google Authenticator-style TOTP requires storing seeds on each server for each user. Seed management, backup, and recovery at scale is a nightmare.
User Experience Friction
Per-server TOTP is poor UX. Users must manage different TOTP entries for different servers. Push-based MFA (Duo, Okta) is better UX but complex to deploy per-server.
SSH Key + No MFA
Most organizations authenticate SSH via keys without any MFA. The key is the only factor. If compromised, there's no second challenge.
Upgrade Breakage
OS upgrades and SSH daemon updates frequently break MFA configurations. Debugging authentication on production servers is risky.
How OnePAM Enforces MFA on SSH
Step-by-step guide to deploying identity-based SSH access.
Deploy OnePAM
Install agent on servers or deploy gateway SSH proxy. No per-server configuration required.
Connect Your IdP's MFA
OnePAM uses your IdP's existing MFA configuration. Whatever MFA you've set up in Okta, Azure AD, or Google Workspace applies to SSH.
Define MFA Policies Per Server Group
Set different MFA requirements for different server groups or access levels.
Users SSH with MFA
'onepam ssh server.example.com' triggers IdP authentication with MFA. After completing MFA, the SSH session begins.
Audit MFA Compliance
Track MFA usage across all SSH sessions. Identify sessions, users, or servers that don't meet MFA requirements.
Benefits of SSH MFA Enforcement
What changes when you deploy identity-based SSH access.
Zero Per-Server MFA Config
No TOTP seeds, no per-server configuration. MFA is enforced centrally through your IdP's existing policies.
Zero per-server configurationIdP MFA Policies on SSH
The same MFA policies you use for SaaS apps (Duo push, FIDO2, biometrics) now apply to SSH. One policy, all applications.
Consistent MFA across all accessNo Configuration Drift
MFA policies are centralized in your IdP. Changes apply to SSH immediately. No per-server updates needed.
Zero drift, always consistentSupport All MFA Methods
Duo push, FIDO2 security keys, biometrics, TOTP, SMS — whatever your IdP supports. OnePAM doesn't limit MFA options.
All IdP MFA methods supportedStep-Up MFA for Sudo
Require additional MFA verification when users escalate to root via sudo. Critical commands get extra authentication.
MFA step-up for privileged opsCompliance Evidence
Prove to auditors that 100% of SSH sessions are MFA-protected. OnePAM logs include MFA method and verification status.
100% MFA-verified SSH sessionsSSH SSO Capabilities
Every feature needed for enterprise-grade SSH authentication.
Zero-Day Protection Features
Enterprise-grade security controls for SSH access.
SSH MFA Enforcement Use Cases
Common scenarios where organizations deploy OnePAM SSH SSO.
SSH MFA Enforcement FAQ
Common questions about SSH SSO and zero-day protection.
Can OnePAM enforce MFA without configuring each server individually?
Which MFA methods are supported?
Can I require different MFA levels for different servers?
Does MFA add latency to SSH sessions?
Can I enforce MFA for sudo commands?
What about break-glass emergency access without MFA?
Enforce MFA on Every SSH Session
Your IdP's MFA policies applied to SSH — no per-server configuration.