How Two Factor Authentication Works


Two Factor Authentication can be set up for most online accounts and is a great tool to help keep your personal information safe. It forces unrecognized users to have both your password and a verification code that is either sent to your phone or generated by your phone It keeps the bad people out and it is free to set up. Here is how to do it.

Accounts with two-factor authentication enabled, can only be accessed on devices you trust, like your phone, tablet, or computer. When you want to sign in to a new device for the first time, you'll need to provide two pieces of information—your password and the six-digit verification code that can be generated on an app or sent to you to your phone via sms message.

By entering the code, you're verifying that you trust the new device. Because your password alone is no longer enough to access your account, two-factor authentication dramatically improves the security of your accounts.

After the initial sign in on a new device you won’t be asked for a verification code on that device again unless you sign out completely or change your password for security reasons.

Set up is usually quite easy but it does vary depending on which type of account your setting up. Authentication is typically granted by 1 of 3 methods; Trusted Device, Trusted Phone Number, Verification codes

Trusted devices

iCloud uses trusted devices such as an iPhone, iPad, iPod touch or your Mac

Trusted phone numbers

A trusted phone number is a number that can be used to receive verification codes by text message or automated phone call. Typically you verify your phone number to when you enroll in two-factor authentication.

Verification codes

Verification codes are temporary codes generated by an authorization app that you install on your phone. There are plenty of these apps Google authenticator iOS, Android or Authy are both free apps that get the job done.

With more and more reports of online hacking, this is one tool that is easy to implement, free and makes a huge difference in protecting your data.

James Dunnigan2 Factor