{"id":4255,"date":"2023-08-21T15:06:39","date_gmt":"2023-08-21T13:06:39","guid":{"rendered":"https:\/\/blog.gdsys.de\/en\/?p=4255"},"modified":"2023-08-21T16:21:15","modified_gmt":"2023-08-21T14:21:15","slug":"2-factor-authentication-introducing-a-new-security-feature","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/","title":{"rendered":"2-factor authentication: Introducing a new security feature"},"content":{"rendered":"<p>Reliable IT infrastructures are nowadays the basis for operating processes in almost all economic and social sectors. Disruptions to the infrastructure can, at worst, lead to a shutdown of operations and severe economic consequences or dangers to public safety. At the same time, with increasing digitalization and networking, the target area for cyberattacks is growing. In view of these dangers, it is crucial to protect control rooms and IT systems appropriately.<\/p>\n<p>We are now implementing an effective security feature to minimize the risk of cyberattacks and to ensure that only authorized users have access: 2-factor authentication (2FA).<\/p>\n<h2>Twofold security of KVM systems<\/h2>\n<p>2-factor authentication for <a href=\"https:\/\/blog.gdsys.de\/en\/2022\/10\/10\/how-to-seamlessly-integrate-kvm-systems-into-high-end-collaborative-control-rooms\/\" target=\"_blank\" rel=\"noopener\">KVM systems<\/a> provides access control to critical data and systems. It thus offers a higher standard of security, ensuring that only authorized users can access the systems. This additional security level contributes to protecting sensitive data and significantly reducing the risk of cyberthreats.<\/p>\n<p>Until now, user authentication for KVM systems involved a password query. The optional 2FA introduces a second, ownership-based factor that provides an additional level of security. This uses a Time-Based-One-Time-Password (TOTP), which is a password that remains valid for a limited time and has a one-time use only.<\/p>\n<figure id=\"attachment_4256\" aria-describedby=\"caption-attachment-4256\" style=\"width: 502px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-scaled.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-4256\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-236x300.jpg\" alt=\"2-factor authentication for a matrix installation\" width=\"502\" height=\"638\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-236x300.jpg 236w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-807x1024.jpg 807w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-768x975.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1210x1536.jpg 1210w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1613x2048.jpg 1613w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-473x600.jpg 473w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-scaled.jpg 2017w\" sizes=\"(max-width: 502px) 100vw, 502px\" \/><\/a><figcaption id=\"caption-attachment-4256\" class=\"wp-caption-text\">2-factor authentication for a matrix installation<\/figcaption><\/figure>\n<h2><\/h2>\n<h2>Apps, tokens, and directory services &#8211; 2FA options<\/h2>\n<p>Depending on the user&#8217;s individual requirements and preferences, the user can implement 2FA through either authenticator apps or hardware tokens. The user can select between using the device&#8217;s internal authentication server or an external directory service such as LDAP, Active Directory, Radius, or TACACS+. The option of 2-factor authentication for KVM systems represents a further step towards a safer and more secure environment for critical infrastructures. Businesses and organizations that rely on the highest security standards will benefit from this additional security mechanism.<\/p>\n<p>In <a href=\"https:\/\/blog.gdsys.de\/en\/2020\/12\/10\/remoteaccess-cpu-how-to-integrate-virtual-machines-into-your-kvm-matrix-installation\/\" target=\"_blank\" rel=\"noopener\">matrix installations<\/a>, the feature ensures increased security by providing an optional additional layer of security for access to critical data and systems. This feature also brings significant benefits in extender applications, which include 2FA by default. Introduced to the public for the first time at <a href=\"https:\/\/www.iseurope.org\/welcome\" target=\"_blank\" rel=\"noopener\">ISE 2023<\/a> for KVM-over-IP systems, the feature is now being incorporated into all G&amp;D products with a network connection. Existing customers will therefore also receive the extended system options as usual with the next firmware release. Further information can be found on our <a href=\"https:\/\/www.gdsys.com\/en\/start\" target=\"_blank\" rel=\"noopener\">website<\/a>.<\/p>\n<div class=\"shariff\" data-title=\"2-factor authentication: Introducing a new security feature\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-236x300.jpghttps:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-236x300.jpg 236w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-807x1024.jpg 807w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-768x975.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1210x1536.jpg 1210w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1613x2048.jpg 1613w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-473x600.jpg 473w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-scaled.jpg 2017w\" data-url=\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Reliable IT infrastructures are nowadays the basis for operating processes in almost all economic and social sectors. Disruptions to the infrastructure can, at worst, lead to a shutdown of operations and severe economic consequences or dangers to public safety. At the same time, with increasing digitalization and networking, the target area for cyberattacks is growing. &#8230;<\/p>\n","protected":false},"author":14,"featured_media":4257,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[19,623],"tags":[691,661,86,4,5,407,327,341,21,345,20,413,690,85,24,84],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enhancing cybersecurity with 2-factor authentication for KVM systems<\/title>\n<meta name=\"description\" content=\"Benefit from a more secure critical infrastructure environment with 2-factor authentication to minimize the risk of cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing cybersecurity with 2-factor authentication for KVM systems\" \/>\n<meta property=\"og:description\" content=\"Benefit from a more secure critical infrastructure environment with 2-factor authentication to minimize the risk of cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-21T13:06:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-21T14:21:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Visual_2-Faktor-Authentifizierung_1920x600_en.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eva Kring\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Visual_2-Faktor-Authentifizierung_1920x600_en.jpg\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Visual_2-Faktor-Authentifizierung_1920x600_en.jpg\",\"width\":1920,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/\",\"name\":\"Enhancing cybersecurity with 2-factor authentication for KVM systems\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#primaryimage\"},\"datePublished\":\"2023-08-21T13:06:39+00:00\",\"dateModified\":\"2023-08-21T14:21:15+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5\"},\"description\":\"Benefit from a more secure critical infrastructure environment with 2-factor authentication to minimize the risk of cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"2-factor authentication: Introducing a new security feature\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5\",\"name\":\"Eva Kring\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g\",\"caption\":\"Eva Kring\"},\"description\":\"Markting Communications Manager bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Marketing Communications Manager at Guntermann &amp; Drunck. You can find me on LinkedIn.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/eva-kring-61a027270\/\"],\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/evakring\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancing cybersecurity with 2-factor authentication for KVM systems","description":"Benefit from a more secure critical infrastructure environment with 2-factor authentication to minimize the risk of cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing cybersecurity with 2-factor authentication for KVM systems","og_description":"Benefit from a more secure critical infrastructure environment with 2-factor authentication to minimize the risk of cyberattacks.","og_url":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_published_time":"2023-08-21T13:06:39+00:00","article_modified_time":"2023-08-21T14:21:15+00:00","og_image":[{"width":1920,"height":600,"url":"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Visual_2-Faktor-Authentifizierung_1920x600_en.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Eva Kring","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Visual_2-Faktor-Authentifizierung_1920x600_en.jpg","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Visual_2-Faktor-Authentifizierung_1920x600_en.jpg","width":1920,"height":600},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/","name":"Enhancing cybersecurity with 2-factor authentication for KVM systems","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#primaryimage"},"datePublished":"2023-08-21T13:06:39+00:00","dateModified":"2023-08-21T14:21:15+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5"},"description":"Benefit from a more secure critical infrastructure environment with 2-factor authentication to minimize the risk of cyberattacks.","breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"2-factor authentication: Introducing a new security feature"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5","name":"Eva Kring","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g","caption":"Eva Kring"},"description":"Markting Communications Manager bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Marketing Communications Manager at Guntermann &amp; Drunck. You can find me on LinkedIn.","sameAs":["https:\/\/www.linkedin.com\/in\/eva-kring-61a027270\/"],"url":"https:\/\/blog.gdsys.de\/en\/author\/evakring\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4255"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=4255"}],"version-history":[{"count":5,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4255\/revisions"}],"predecessor-version":[{"id":4263,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4255\/revisions\/4263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/4257"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=4255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=4255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=4255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}