Two-factor authentication restrictions

  • When an SSH client establishes a connection by choosing the user authentication method password or public-key and password, the switch will terminate the connection if two-factor authentication or password configuration-control is enabled.

  • For successful authentication when Two-factor authentication is enabled, the user authentication method must be public-key and keyboard interactive.

  • When password configuration-control alone is enabled, the user authentication method must include keyboard interactive.