From 8c982bca660db7984448019e799df6c78c57618b Mon Sep 17 00:00:00 2001 From: deathrow Date: Sat, 18 Jun 2022 00:25:18 -0400 Subject: [PATCH] Remove MFA as there are better alternatives such as utilizing KeePass. Expanded on the "desktop" section. --- _items/Another guide.md | 16 ---------------- 1 file changed, 16 deletions(-) diff --git a/_items/Another guide.md b/_items/Another guide.md index 75a248b..2c03a2e 100644 --- a/_items/Another guide.md +++ b/_items/Another guide.md @@ -483,22 +483,6 @@ auth include yubikey ```
-###### Multi-Factor Authentication - -We are able to utilize a network-isolated Qube for MFA. This allows us to have security benefits of MFA while increased security as the qube is entirely offline and isolated. We will be utilizing the ``oathtool`` for this MFA setup. Start off by creating a template preferably cloned from ``fedora-minimal`` and then ``sudo dnf install oathtool``. Afterwords, create an AppVM based on the MFA template we just created *without* network access. - -Whenever you are enabling 2FA, ensure to copy the secret key, then paste it into your MFA qube as such: - -``` -oathtool --base-32 --totp "SECRET_KEY" -``` - -Such a command will print the one-time token. - -It's best to preferably save the above command you typed, as this is how you will retrieve your one-time token. You're able to create a simple script that just executes the above command. You will do this for each 2FA account. ``account-1.sh``, ``account-2.sh``. - -
- ###### GUI-VM This is for advanced users. Read the [official documentation](https://qubes-os.org/guivm-configuration).