Essential Eight on Linux, Part 5 of 8: Multi-Factor Authentication on Ubuntu 26.04 LTS Source

1---
2title: "Essential Eight on Linux, Part 5 of 8: Multi-Factor Authentication on Ubuntu 26.04 LTS"
3date: "2026-04-30"
4tags: ["essential-eight", "asd", "ism", "ubuntu", "linux", "teleport", "entra-id", "active-directory", "mfa", "security"]
5author: "Gavin Jackson"
6excerpt: "Part 5 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering multi-factor authentication with Teleport, Entra ID, Active Directory integration, and phishing-resistant MFA."
7---
8
9# Essential Eight on Linux, Part 5 of 8: Multi-Factor Authentication on Ubuntu 26.04 LTS
10
11Multi-factor authentication on Linux is easy to do badly.
12
13There are plenty of ways to bolt a second factor onto a PAM stack and declare victory. That may technically satisfy a checklist, but it does not always produce a manageable, phishing-resistant, or scalable control.
14
15For Ubuntu 26.04 LTS, I think the strongest reference model is:
16
17- central identity provider
18- strong MFA at the identity layer
19- brokered access to Linux resources
20- short-lived credentials instead of static secrets
21
22That is why Teleport keeps showing up in this series.
23
24## What ASD is trying to achieve
25
26The point of MFA is not just to add another prompt. It is to make stolen passwords materially less useful and to raise the cost of account compromise, especially for privileged and externally accessible services.
27
28For Linux resources, the main targets are:
29
30- SSH access
31- web administration portals
32- privileged access workflows
33- remote access into production or sensitive environments
34
35## Ubuntu 26.04 LTS reference implementation
36
37### Resolute Raccoon highlights
38
39This is one area where Ubuntu 26.04 LTS clearly moved the platform forward. Canonical now ships **authd** in the official repositories, with support for **Microsoft Entra ID**, **Google IAM**, and generic **OIDC** providers.
40
41That means Ubuntu now has a much cleaner first-party path for cloud-backed identity and Linux login than it did on Ubuntu 24.04 LTS. I still prefer Teleport for privileged access brokering and stronger JIT control, but authd makes the identity layer underneath that design more compelling.
42
43### 1. Put MFA in front of access, not just on the host
44
45Ubuntu supports host-level MFA through PAM modules, and there are cases where that is useful. But at fleet scale, the cleaner pattern is to put MFA at the identity and access broker layer.
46
47That gives you:
48
49- central policy
50- stronger reporting
51- consistent user experience
52- easier enforcement of phishing-resistant methods
53
54### 2. Use Teleport for SSH and privileged Linux access
55
56Teleport is a strong fit for Linux MFA because it can enforce MFA before issuing the short-lived certificate used to access the target resource.
57
58That matters because it moves you away from:
59
60- static SSH keys
61- password-based SSH
62- inconsistent host-by-host MFA configuration
63
64and toward:
65
66- SSO
67- MFA at login and re-auth points
68- certificate-based access
69- session recording and audit
70
71### 3. Use Entra ID for modern SSO and MFA policy
72
73If your organisation already uses Microsoft 365, Entra ID is often the most natural place to enforce:
74
75- MFA requirements
76- conditional access
77- device or risk-based access policies
78- phishing-resistant methods such as FIDO2
79
80Teleport integrates well here because it can consume Entra as the identity provider while still presenting a Linux-native access pattern to the target hosts.
81
82### 4. Keep Active Directory where it still makes operational sense
83
84On some internal networks, Ubuntu joined to AD through SSSD still makes sense for identity and local account mapping.
85
86That is not in conflict with Entra-backed MFA. You can use AD for traditional enterprise integration and Teleport plus Entra for the stronger external access and privileged access story.
87
88### 5. Prefer phishing-resistant MFA where possible
89
90> **What makes MFA phishing resistant?**
91>
92> This was actually a new term for me when I started digging into the detailed ISM controls rather than just the high-level Essential Eight wording.
93>
94> In simple terms, **phishing-resistant MFA** means the second factor is designed so it is much harder for an attacker to steal, replay, or trick a user into handing it over through a fake login page. That is the big difference between something like a **FIDO2 security key or passkey** and a weaker method such as **SMS codes** or even app-based one-time passwords.
95>
96> If a user can be convinced to type the code into a fake website, approve a rogue prompt, or hand the factor to an attacker in real time, it is not very phishing resistant. By contrast, modern public-key methods bind the authentication to the legitimate service, which makes credential theft through fake sign-in pages much harder.
97>
98> That is why ASD keeps pushing the concept: not all MFA is equal, and some forms of MFA hold up much better when someone is actively trying to phish your users.
99
100For sensitive Linux administration, my preference order is usually:
101
1021. FIDO2 or WebAuthn security keys
1032. smart cards or certificate-backed methods
1043. app-based OTP as a fallback
1054. avoid SMS unless legacy realities force it
106
107This matters even more for privileged access. If the user can reach production Linux with the identity, the MFA method should not be the weakest thing in the chain.
108
109## ISM control mapping
110
111The October 2024 Essential Eight to ISM mapping ties this mitigation to these controls:
112
113| ISM control | Linux implementation on Ubuntu 26.04 LTS |
114|-------------|-------------------------------------------|
115| `ISM-1504` | Require MFA for users of important systems and services that expose Linux administration or sensitive data. |
116| `ISM-1679` | Enforce MFA for externally accessible services, including brokered SSH and administrative web portals. |
117| `ISM-1680` | Apply MFA consistently to administrative access paths rather than leaving privileged exceptions. |
118| `ISM-1892` | Use stronger MFA controls for higher-risk access scenarios and sensitive systems. |
119| `ISM-1893` | Prefer phishing-resistant MFA methods where practical for privileged or exposed services. |
120| `ISM-1681` | Ensure MFA is integrated into remote access and privileged workflows, not left as an optional extra. |
121| `ISM-1401` | Protect authentication events with logging and auditability. |
122| `ISM-1173` | Review MFA scope and user coverage regularly. |
123| `ISM-0974` | Protect credentials and authentication secrets from misuse or reuse. |
124| `ISM-1872` | Extend MFA coverage to important applications and administrative interfaces. |
125| `ISM-1873` | Apply MFA to privileged and higher-risk access paths with stronger assurance. |
126| `ISM-1682` | Avoid weak or inconsistent second-factor implementations across the environment. |
127| `ISM-1683` | Revalidate MFA configuration, exemptions, and method strength over time. |
128| `ISM-1815` | Apply higher-maturity authentication controls across privileged workflows. |
129| `ISM-1906` | Align stronger authentication requirements with other uplift controls. |
130| `ISM-1228` | Monitor authentication activity for misuse, anomalies, and incident response. |
131| `ISM-0123` | Protect security logs related to authentication. |
132| `ISM-0140` | Retain sufficient authentication records for investigations. |
133| `ISM-1819` | Improve authentication assurance over time instead of freezing the design at rollout. |
134| `ISM-1505` | Protect remote access paths with strong authentication. |
135| `ISM-1874` | Enforce stronger MFA for high-risk remote and administrative use cases. |
136| `ISM-1894` | Prefer phishing-resistant MFA in higher maturity implementations. |
137| `ISM-1907` | Reduce reliance on weaker factors as the environment matures. |
138| `ISM-0109` | Protect authentication systems and their supporting infrastructure. |
139
140## Where native Linux can get messy
141
142PAM-based MFA works, but on its own it can become:
143
144- inconsistent across hosts
145- hard to audit centrally
146- brittle during break-glass events
147- uneven across SSH, web apps, and administrative tools
148
149That is why I prefer identity-brokered MFA over host-by-host MFA as the primary pattern.
150
151## Practical Linux pattern
152
153For an Ubuntu 26.04 estate, I would aim for:
154
155- no password-based SSH for administrators
156- Teleport in front of privileged Linux access
157- Entra ID as the SSO and MFA authority where appropriate
158- AD integration on hosts where traditional enterprise identity is still needed
159- FIDO2 security keys for privileged users
160- local PAM MFA only for targeted use cases or resilience paths
161
162That gives you a control that scales and remains auditable.
163
164## The bottom line
165
166Ubuntu 26.04 LTS can absolutely meet the intent of the Essential Eight MFA mitigation, but the strongest implementation is not "turn on another PAM module everywhere and hope for the best."
167
168The better answer is **central identity**, **strong MFA**, and **brokered Linux access** using tools like **Teleport**, with **Entra ID** or another mature IdP enforcing the real authentication policy. Resolute Raccoon's new **authd** packaging is one of the more useful Linux identity improvements in this release because it gives Ubuntu a more official bridge into modern cloud identity.
169
170## References
171
172- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)
173- [Implementing multi-factor authentication](https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/implementing-multi-factor-authentication)
174- [Guidelines for system hardening](https://www.cyber.gov.au/business-and-government/cyber-security-frameworks/ism/cybersecurity-guidelines/guidelines-for-system-hardening)
175- [Teleport authentication and MFA](https://goteleport.com/docs/zero-trust-access/authentication/)
176- [Teleport Microsoft Entra ID SSO](https://goteleport.com/docs/zero-trust-access/sso/integrate-idp/entra-id/)
177- [Ubuntu Active Directory integration](https://ubuntu.com/server/docs/service-sssd-ad)
178- [Microsoft Entra ID documentation](https://learn.microsoft.com/entra/fundamentals/whatis)
179- [authd documentation](https://documentation.ubuntu.com/authd/stable-docs/)
180