We’ll log in to a Linux machine and see MFA being applied. This demonstrates one of the many opportunities to better show the identity of the user using MFA.