Beijing Infosec Technologies Limited (stock code: 688201) has announced its National Cryptography SSH two-factor authentication solution, which establishes a dual protection system through a “national encryption tunnel + multi-factor identity verification,” providing comprehensive security enhancements for remote access to Linux servers.
As the first company in China to pass the commercial cryptography testing for SSH products, Infosec’s SSH server (NetSSH-Server) and client (NetSSH-Client) have been tested and certified by national authorities for commercial cryptographic products.
The requirements in the Information Security Technology standard GB/T 39786 (“Basic Requirements for Cryptographic Applications in Information Systems”) and GM/T 0115-2021 (“Cryptographic Application Evaluation Requirements”) specify that remote management must establish a “security transmission channel based on cryptographic technology.” This must support identity verification, confidentiality, and integrity protection. Accordingly, traditional SSH solutions no longer meet both compliance and security expectations, creating an urgent need for a practical, assessable upgrade path for enterprises.
Infosec’s National Cryptography SSH two-factor authentication access solution boasts excellent features, including :
1. Full-stack National Encryption Support: Built on China’s national encryption algorithms SM2/SM3/SM4, we establish a secure, encrypted SSH channel to ensure that the entire communication process remains fully controllable and independently governed.
2. Diverse Two-Factor Authentication: Flexibly supports various multi-factor authentication mechanisms, including dynamic passwords, QR code signatures, collaborative signatures, and Ukey certificates. This shifts us from "weak authentication" to a "strong identity trust system," effectively reducing the risk of account leakage.
3. Compliance Out of the Box: The product strictly adheres to GM/T 0129 "SSH Password Protocol Specification" and GM/T 0028 "Security Technical Requirements for Cryptographic Modules." This means it meets cryptographic evaluation requirements throughout the entire deployment process.
The solution is designed to meet all cryptographic evaluation requirements throughout the entire process. With three adaptable authentication modes for diverse scenarios, its flexible architecture assists enterprises in building a compliant and controllable remote operations system, developing sustainable identity security capabilities, and building a future-proof domestic cryptography infrastructure. This transforms compliance requirements into measurable and operational security capabilities.
