SSH keys still represent only a single factor of authentication, thus the need for further security.Google’s PAM module generates TOTP compatible with any OATH-TOTP app.Be sure to save the secret key, verification code, and recovery codes in a secure location.Configure sshd configuration file by appending the following line to the end of the file.Locate the ChallengeResponseAuthentication option and set its value to 'yes' and save the file.If you haven’t set up SSH keys, skip Step — 4.MFA won’t function if you’re using an SSH key.This approach significantly improves security by making it much more difficult for unauthorized users to gain SSH access.Enter the code generated by the app, which will complete the login.Implementing 2FA significantly improves security.