Facebook Icon Facebook Icon Twitter Icon Twitter Icon Linkedin Icon Linkedin Icon Blog Icon Blog Icon Checkmark Icon Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Small Checkmark Icon Clock Icon Clock Icon Cloud Icon Cloud Icon Cloud Upload Icon Cloud Upload Icon Compass Icon Compass Icon Medium count 1 Icon Medium count 1 Icon Medium count 2 Icon Medium count 2 Icon Medium count 3 Icon Medium count 3 Icon Medium count 4 Icon Medium count 4 Icon Medium count 5 Icon Medium count 5 Icon Medium count 6 Icon Medium count 6 Icon Medium count 7 Icon Medium count 7 Icon Medium count 8 Icon Medium count 8 Icon Medium count 9 Icon Medium count 9 Icon Medium count 10 Icon Medium count 10 Icon Medium count 11 Icon Medium count 11 Icon Medium count 12 Icon Medium count 12 Icon Medium count 13 Icon Medium count 13 Icon Medium count 14 Icon Medium count 14 Icon Medium count 15 Icon Medium count 15 Icon Device with a checkmark Icon Device with a checkmark Icon Device Icon Device Icon Documentation Icon Documentation Icon Dollar Sign Icon Dollar Sign Icon Extend Icon Extend Icon Eye Icon Eye Icon Gear Icon Gear Icon Globe Icon Globe Icon Graph Icon Graph Icon Guidelines Icon Guidelines Icon Laptop Icon Laptop Icon Layers with checkmark Icon Layers with checkmark Icon Key Icon Key Icon Lock Icon Lock Icon Paper Airplane Icon Paper Airplane Icon Pencil Icon Pencil Icon Phone Icon Phone Icon Reliability Icon Reliability Icon Reset Icon Reset Icon Shield with Checkmark Icon Shield with Checkmark Icon Timer Icon Timer Icon Tools Icon Tools Icon Tutorial Icon Tutorial Icon Upload Icon Upload Icon User with Checkmark Icon User with Checkmark Icon User Icon User Icon Wallet Icon Wallet Icon Case Study Icon Case Study Icon Video Icon Video Icon Webinar Icon Webinar Icon White Paper Icon White Paper Icon

SSH Locked down

SSH Two-Factor Authentication: Lock your machines with certificates + security codes

Features

30 second installation

Forget those complicated installation procedures. It takes 30 seconds from start to finish to add Authy Two-Factor Authentication to your SSH.

Authorized keys

We know passwords are not safe, we designed Authy SSH to work best with authorized keys.

Mobile Apps or SMS

Someone in your organization doesn't have a smartphone? We got you covered. Authy SSH can send them the token via SMS or a phone call. The rest can install the Authy App for free right to their phones (it even works while your offline).

Watch the Video

Installation steps

  1. Get your Authy API Key at: https://www.authy.com/signup.
  2. Get the code: https://github.com/authy/authy-ssh
  3. Install it:
    sudo bash authy-ssh install /usr/local/bin
  4. Enable it:
    sudo /usr/local/bin/authy-ssh enable `whoami`
  5. Test it: authy-ssh test
  6. Restart your ssh server:
    sudo service ssh restart

Troubleshooting

SCP stopped working

Currently SCP breaks, we're working on a way to fix it

Benefits

Simple deployment

You can easily add SSH Two-Factor Authentication to all of your machines in an instant. It works great with chef or puppet.

Great security

Certificates can be stolen remotely from your machine, but stealing your physical phone is harder. Two-Factor brings a whole new layer of security to your SSH access.

Hassle free

Authy is simple all the way, from the installation to the mobile app's. We take care of all the little details so you can just relax.