Skip to main content
  1. Blog
  2. Article

Kris Sharma
on 14 August 2020

Optimised authentication methods for Ubuntu Desktop


Still counting on passwords to protect your workstation? When set up properly, alternatives to passwords provide a streamlined user experience while significantly improving security. These alternative authentication methods can also easily be combined to create a custom and adaptive authentication profile.

This whitepaper introduces three popular authentication methods that provide a solid alternative to passwords. Perhaps you’d like to configure your laptop for login using a YubiKey hardware token connected to a dock. Another option could be to login with a Duo push notification when not connected to the dock, but use a Google Authenticator one-time password when no network is available. Maybe you need a separate hardware token just for ssh authentication, and you always need to keep a long, complex password for emergency authentication should all other methods fail. All of these scenarios can be easily configured within Ubuntu.

Highlights of this whitepaper include:

  • Configuration instructions for Yubikeys, the Google Authenticator app and Duo push notifications
  • Guidance on using Pluggable Authentication Modules (PAM) within Ubuntu
  • Planning and testing strategies for creating a multi-factor authentication experience
  • An overview of NIST guidance (NIST 800-63 series, Digital Identity Guidelines) to aid in building an authentication plan

Download this whitepaper on optimizing your authentication experience to see how to combine Yubikeys, the Google Authenticator app, Duo push notifications with traditional passwords to create that custom authentication experience.

Download Whitepaper:

Related posts


Luci Stanescu
8 May 2026

Dirty Frag Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

Two local privilege escalation (LPE) vulnerabilities affecting the Linux kernel have been publicly disclosed on May 7, 2026. One of the vulnerabilities has been assigned the ID: CVE-2026-43284. The other CVE ID is pending. Both are referred to as “Dirty Frag.” The affected components are Linux kernel modules. The first vulnerability impac ...


Luci Stanescu
30 April 2026

Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on April 29, 2026. The vulnerability has been assigned CVE ID CVE-2026-31431 and is referred to as Copy Fail. The affected component is a kernel module that provides hardware-accelerated cryptographic functions: algif_aead. The vulnerab ...


Canonical
23 April 2026

Canonical releases Ubuntu 26.04 LTS Resolute Raccoon

Canonical announcements Article

The 11th long-term supported release of Ubuntu delivers deep silicon optimization and state-of-the-art security for enterprise workloads. ...