If something more robust is needed, ssh certs and principals can be used.
Some use Pam modules to require 2nd factor too.
If something more robust is needed, ssh certs and principals can be used.
Some use Pam modules to require 2nd factor too.