Essential Eight on Linux, Part 5 of 8: Multi-Factor Authentication on Ubuntu 26.04 LTS Source
Markdown source
1---2title: "Essential Eight on Linux, Part 5 of 8: Multi-Factor Authentication on Ubuntu 26.04 LTS"3date: "2026-04-30"4tags: ["essential-eight", "asd", "ism", "ubuntu", "linux", "teleport", "entra-id", "active-directory", "mfa", "security"]5author: "Gavin Jackson"6excerpt: "Part 5 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering multi-factor authentication with Teleport, Entra ID, Active Directory integration, and phishing-resistant MFA."7---89# Essential Eight on Linux, Part 5 of 8: Multi-Factor Authentication on Ubuntu 26.04 LTS1011Multi-factor authentication on Linux is easy to do badly.1213There are plenty of ways to bolt a second factor onto a PAM stack and declare victory. That may technically satisfy a checklist, but it does not always produce a manageable, phishing-resistant, or scalable control.1415For Ubuntu 26.04 LTS, I think the strongest reference model is:1617- central identity provider18- strong MFA at the identity layer19- brokered access to Linux resources20- short-lived credentials instead of static secrets2122That is why Teleport keeps showing up in this series.2324## What ASD is trying to achieve2526The point of MFA is not just to add another prompt. It is to make stolen passwords materially less useful and to raise the cost of account compromise, especially for privileged and externally accessible services.2728For Linux resources, the main targets are:2930- SSH access31- web administration portals32- privileged access workflows33- remote access into production or sensitive environments3435## Ubuntu 26.04 LTS reference implementation3637### Resolute Raccoon highlights3839This is one area where Ubuntu 26.04 LTS clearly moved the platform forward. Canonical now ships **authd** in the official repositories, with support for **Microsoft Entra ID**, **Google IAM**, and generic **OIDC** providers.4041That means Ubuntu now has a much cleaner first-party path for cloud-backed identity and Linux login than it did on Ubuntu 24.04 LTS. I still prefer Teleport for privileged access brokering and stronger JIT control, but authd makes the identity layer underneath that design more compelling.4243### 1. Put MFA in front of access, not just on the host4445Ubuntu supports host-level MFA through PAM modules, and there are cases where that is useful. But at fleet scale, the cleaner pattern is to put MFA at the identity and access broker layer.4647That gives you:4849- central policy50- stronger reporting51- consistent user experience52- easier enforcement of phishing-resistant methods5354### 2. Use Teleport for SSH and privileged Linux access5556Teleport is a strong fit for Linux MFA because it can enforce MFA before issuing the short-lived certificate used to access the target resource.5758That matters because it moves you away from:5960- static SSH keys61- password-based SSH62- inconsistent host-by-host MFA configuration6364and toward:6566- SSO67- MFA at login and re-auth points68- certificate-based access69- session recording and audit7071### 3. Use Entra ID for modern SSO and MFA policy7273If your organisation already uses Microsoft 365, Entra ID is often the most natural place to enforce:7475- MFA requirements76- conditional access77- device or risk-based access policies78- phishing-resistant methods such as FIDO27980Teleport integrates well here because it can consume Entra as the identity provider while still presenting a Linux-native access pattern to the target hosts.8182### 4. Keep Active Directory where it still makes operational sense8384On some internal networks, Ubuntu joined to AD through SSSD still makes sense for identity and local account mapping.8586That is not in conflict with Entra-backed MFA. You can use AD for traditional enterprise integration and Teleport plus Entra for the stronger external access and privileged access story.8788### 5. Prefer phishing-resistant MFA where possible8990> **What makes MFA phishing resistant?**91>92> This was actually a new term for me when I started digging into the detailed ISM controls rather than just the high-level Essential Eight wording.93>94> In simple terms, **phishing-resistant MFA** means the second factor is designed so it is much harder for an attacker to steal, replay, or trick a user into handing it over through a fake login page. That is the big difference between something like a **FIDO2 security key or passkey** and a weaker method such as **SMS codes** or even app-based one-time passwords.95>96> If a user can be convinced to type the code into a fake website, approve a rogue prompt, or hand the factor to an attacker in real time, it is not very phishing resistant. By contrast, modern public-key methods bind the authentication to the legitimate service, which makes credential theft through fake sign-in pages much harder.97>98> That is why ASD keeps pushing the concept: not all MFA is equal, and some forms of MFA hold up much better when someone is actively trying to phish your users.99100For sensitive Linux administration, my preference order is usually:1011021. FIDO2 or WebAuthn security keys1032. smart cards or certificate-backed methods1043. app-based OTP as a fallback1054. avoid SMS unless legacy realities force it106107This matters even more for privileged access. If the user can reach production Linux with the identity, the MFA method should not be the weakest thing in the chain.108109## ISM control mapping110111The October 2024 Essential Eight to ISM mapping ties this mitigation to these controls:112113| ISM control | Linux implementation on Ubuntu 26.04 LTS |114|-------------|-------------------------------------------|115| `ISM-1504` | Require MFA for users of important systems and services that expose Linux administration or sensitive data. |116| `ISM-1679` | Enforce MFA for externally accessible services, including brokered SSH and administrative web portals. |117| `ISM-1680` | Apply MFA consistently to administrative access paths rather than leaving privileged exceptions. |118| `ISM-1892` | Use stronger MFA controls for higher-risk access scenarios and sensitive systems. |119| `ISM-1893` | Prefer phishing-resistant MFA methods where practical for privileged or exposed services. |120| `ISM-1681` | Ensure MFA is integrated into remote access and privileged workflows, not left as an optional extra. |121| `ISM-1401` | Protect authentication events with logging and auditability. |122| `ISM-1173` | Review MFA scope and user coverage regularly. |123| `ISM-0974` | Protect credentials and authentication secrets from misuse or reuse. |124| `ISM-1872` | Extend MFA coverage to important applications and administrative interfaces. |125| `ISM-1873` | Apply MFA to privileged and higher-risk access paths with stronger assurance. |126| `ISM-1682` | Avoid weak or inconsistent second-factor implementations across the environment. |127| `ISM-1683` | Revalidate MFA configuration, exemptions, and method strength over time. |128| `ISM-1815` | Apply higher-maturity authentication controls across privileged workflows. |129| `ISM-1906` | Align stronger authentication requirements with other uplift controls. |130| `ISM-1228` | Monitor authentication activity for misuse, anomalies, and incident response. |131| `ISM-0123` | Protect security logs related to authentication. |132| `ISM-0140` | Retain sufficient authentication records for investigations. |133| `ISM-1819` | Improve authentication assurance over time instead of freezing the design at rollout. |134| `ISM-1505` | Protect remote access paths with strong authentication. |135| `ISM-1874` | Enforce stronger MFA for high-risk remote and administrative use cases. |136| `ISM-1894` | Prefer phishing-resistant MFA in higher maturity implementations. |137| `ISM-1907` | Reduce reliance on weaker factors as the environment matures. |138| `ISM-0109` | Protect authentication systems and their supporting infrastructure. |139140## Where native Linux can get messy141142PAM-based MFA works, but on its own it can become:143144- inconsistent across hosts145- hard to audit centrally146- brittle during break-glass events147- uneven across SSH, web apps, and administrative tools148149That is why I prefer identity-brokered MFA over host-by-host MFA as the primary pattern.150151## Practical Linux pattern152153For an Ubuntu 26.04 estate, I would aim for:154155- no password-based SSH for administrators156- Teleport in front of privileged Linux access157- Entra ID as the SSO and MFA authority where appropriate158- AD integration on hosts where traditional enterprise identity is still needed159- FIDO2 security keys for privileged users160- local PAM MFA only for targeted use cases or resilience paths161162That gives you a control that scales and remains auditable.163164## The bottom line165166Ubuntu 26.04 LTS can absolutely meet the intent of the Essential Eight MFA mitigation, but the strongest implementation is not "turn on another PAM module everywhere and hope for the best."167168The better answer is **central identity**, **strong MFA**, and **brokered Linux access** using tools like **Teleport**, with **Entra ID** or another mature IdP enforcing the real authentication policy. Resolute Raccoon's new **authd** packaging is one of the more useful Linux identity improvements in this release because it gives Ubuntu a more official bridge into modern cloud identity.169170## References171172- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)173- [Implementing multi-factor authentication](https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/implementing-multi-factor-authentication)174- [Guidelines for system hardening](https://www.cyber.gov.au/business-and-government/cyber-security-frameworks/ism/cybersecurity-guidelines/guidelines-for-system-hardening)175- [Teleport authentication and MFA](https://goteleport.com/docs/zero-trust-access/authentication/)176- [Teleport Microsoft Entra ID SSO](https://goteleport.com/docs/zero-trust-access/sso/integrate-idp/entra-id/)177- [Ubuntu Active Directory integration](https://ubuntu.com/server/docs/service-sssd-ad)178- [Microsoft Entra ID documentation](https://learn.microsoft.com/entra/fundamentals/whatis)179- [authd documentation](https://documentation.ubuntu.com/authd/stable-docs/)180