In this article I will share Step-by-Step Guide to Install and Configure Offline Two Factor Authentication using Open Source Google Authenticator for below scenarios in Linux Configure offline two factor authentication for SSH Configure offline
Check port status To check the list of existing ports which are open we will use nmap to check port status: [root@centos-8 ~]# nmap localhost Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-22 12:08
The SSH protocol (aka Secure Shell) is used to establish secure and reliable communications between two hosts. It supports different ssh authentication methods and uses strong encryption to protect exchanged data. It is possible to
In this article I will share the steps to configure CentOS/Red Hat Network Bound Disk Encryption (NBDE). In our earlier articles we studied all about encrypting different types of disk devices and auto mount
During scratch installation of Red Hat or CentOS, you can select the checkbox to encrypt all the available disks but it is also possible to encrypt root partition and other volumes once OS is installed.
In this article I will share the steps to resize LUKS partition. You can reduce or extend encrypted LUKS partition depending upon the backend file system and device type. I am using RHEL/CentOS 7/8 for