Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Kris Sharma
on 14 August 2020

Optimised authentication methods for Ubuntu Desktop


Still counting on passwords to protect your workstation? When set up properly, alternatives to passwords provide a streamlined user experience while significantly improving security. These alternative authentication methods can also easily be combined to create a custom and adaptive authentication profile.

This whitepaper introduces three popular authentication methods that provide a solid alternative to passwords. Perhaps you’d like to configure your laptop for login using a YubiKey hardware token connected to a dock. Another option could be to login with a Duo push notification when not connected to the dock, but use a Google Authenticator one-time password when no network is available. Maybe you need a separate hardware token just for ssh authentication, and you always need to keep a long, complex password for emergency authentication should all other methods fail. All of these scenarios can be easily configured within Ubuntu.

Highlights of this whitepaper include:

  • Configuration instructions for Yubikeys, the Google Authenticator app and Duo push notifications
  • Guidance on using Pluggable Authentication Modules (PAM) within Ubuntu
  • Planning and testing strategies for creating a multi-factor authentication experience
  • An overview of NIST guidance (NIST 800-63 series, Digital Identity Guidelines) to aid in building an authentication plan

Download this whitepaper on optimizing your authentication experience to see how to combine Yubikeys, the Google Authenticator app, Duo push notifications with traditional passwords to create that custom authentication experience.

Download Whitepaper:

Related posts


Luci Stanescu
28 October 2024

Imagining the future of Cybersecurity

Ubuntu Security

October 2024 marks the 20th anniversary of Ubuntu. The cybersecurity landscape has significantly shifted since 2004. If you have been following the Ubuntu Security Team’s special three-part series podcast that we put out to mark Cybersecurity Awareness Month, you will have listened to us talk about significant moments that have shaped the ...


Hugo Huang
31 March 2025

Securing Software Supply Chains: New Research Highlights Industry Vulnerabilities

Security Article

New IDC study, co-sponsored by Canonical and Google Cloud, reveals the challenges and opportunities for organizations securing their software supply chains. Today, Canonical and Google Cloud released findings from a joint research project conducted by the International Data Corporation (IDC) that sheds light on the critical challenges org ...


Stephanie Domas
24 March 2025

What is Application Security (AppSec)?

Hardening Article

Application security (or AppSec, for short) is a broad term that refers to all of the tools, actions, and processes that an organization uses to protect its applications against vulnerabilities across the entirety of its life cycle. Application security has one objective: to find weaknesses in your applications and systems that could be a ...