Secure AWS Usage by Assume Role and 2FA
-
Updated
Apr 28, 2017 - Shell
Secure AWS Usage by Assume Role and 2FA
A pass extension for managing TOTP Backup Codes
A 2FA interactive authenticator for the command line
Director for the r4 automation project
Copies 2FA codes from iMessage app to clipboard.
Tutorial to create full disk encryption with YubiKey, encrypted boot partition and secure boot with UEFI
Argos extension providing multifactor authentication (MFA/2FA) in GNOME
Ansible role for Installing and managing privacyidea
OpenVPN client tied to a SOCKS proxy server
shows time-based one-time passwords - TOTP - on shell
This module for dracut allows two factor authentication on LUKS, using only another encrypted volume.
Shell script implementation of TOTP (RFC 6238) using openssl command line tool
Bash scripts enabling 2-factor authentication for a range of services on Pi OS. Baseline support for lightdm, login, sshd, su & sudo, however other /etc/pam.d services can be added. Per-user control over which services are 2FA enabled or administrative enforcement.
Generating 2FA codes in your terminal
Shell-script (Bash) with functions relevant to 2FA. Compatible with Google Authenticator.
Oathkeeper, Kratos and Keto in kubernetes.
🔢 Yet another minimal TOTP generator in 5 lines of Bash
Add a description, image, and links to the 2fa topic page so that developers can more easily learn about it.
To associate your repository with the 2fa topic, visit your repo's landing page and select "manage topics."