Two-factor authentication restrictions
When an SSH client establishes a connection by choosing the user authentication method password or public-key and password, the switch will terminate the connection if two-factor authentication or password configuration-control is enabled.
For successful authentication when Two-factor authentication is enabled, the user authentication method must be public-key and keyboard interactive.
When password configuration-control alone is enabled, the user authentication method must include keyboard interactive.