Ever since the announcement, a flurry of fake authenticator apps found their way to the Apple App Store, many of which allegedly send data to the developers while others charge a premium. While there are many authenticator apps you can install on your iPhone, did you know that iOS already comes with a native two-factor authentication code generator?
Once done, you will see 2FA authentication codes which automatically change every 30 seconds and the same has to be used every time you log in to Twitter on a new device. The iOS authenticator app can even autofill the codes the next time you try to log in to the website, which really simplifies the process of using 2FA keys.
The WebAuthn spec createCredential algorithm step 20 "If any authenticator indicates success" 3.1 says to set the AAGUID to all zeroes if "none" attestation is used. Passkeys generally, including those in iCloud Keychain, don't support attestation as it exists today; one of my previous explanations for why is here. So this is expected behavior and is the same for most (all?) synced WebAuthn credentials currently.
I did the following to get Google Authenticator which was already installed on an iPhone with iOS 14.6, added to a new iPad (no deleting of your account from authenticator needed, nor do you need to execute console commands) - this is really simple:
Two-factor authentication (2FA) has entered the news due to a change at the embattled Twitter/X. Under a February policy change, the service is forcing free users unwilling to pay the Twitter Blue subscription away from the SMS-based 2FA system, in favor of using authenticator apps.
Despite the hue and cry about it, authenticator apps are better security-wise than using SMS messages. This is what you should know about 2FA, and how to get up and running with it on one of the most popular authentication apps, Google Authenticator.
While the password for the account classifies as the "know" portion, the "have" consists of some form of verifiable token. This could take the form of a physical object, such as a YubiKey, but more commonly this refers to a mobile authenticator app or an authenticator keyfob.
In effect, the online service you're authenticating with will know what the correct code the authenticator last generated was, and so can confirm or deny whatever code you read and type into the service's log-in screen.
Google Authenticator is a very established and popular authenticator app, for quite a few reasons. For a start, it's reasonably straightforward to use, which is key when trying to encourage more people to secure their accounts in the first place.
Good afternoon - One of our employees has an iPhone 6 with iOS12. Apparently iPhone 6's cannot install versions of iOS13 or newer. In order to download one of the two-factor authentication apps (ie. Google Authenticator), it requires an iOS13 or newer. Since the employee can't install an authenticator app, is there an alternative way they can log into Concur going forward?
Leaks and hacks from recent years make it clear that passwords alone don't provide enough security to protect your online bank accounts, social media logins, or even accounts for websites where you shop. Multi-factor authentication (MFA, also known as two-factor authentication or 2FA) adds another layer of protection. The security coverage team at PCMag frequently exhorts readers to use MFA, and using an authenticator app is one of the easiest and most secure ways to do it.
Using an authenticator app, such as Google Authenticator or Microsoft Authenticator, is a more secure form of MFA than one-time codes sent to you via SMS. We recommend enabling MFA to protect yourself from the consequences of a data breach, and it's among the steps you should take if you discover your information has already been involved in a breach. The best authenticator apps also help protect you against stealthy attacks like stalkerware.
Our summaries of the best authenticator apps, listed alphabetically, will help you decide which one to use so you can start setting up your accounts to be more secure. If you're looking for the best free authenticator app, you're in luck, because they're all free! Below our recommendations, you find more information on just how these apps work to keep you safe, as well as criteria you should consider when choosing one.
2FAS is a simple but fully functional app that does everything you want in an authenticator. It lets you add online accounts either manually or with a QR code. It can create cloud backups of your registered accounts either in iCloud for Apple devices or Google Drive for Androids, which is critical if you lose your phone or get a new one. The backup is encrypted and only accessible from the 2FAS app. 2FAS doesn't need your phone number or even require you to create an online account, so it's not susceptible to SIM-swapping fraud the way Authy is. You can set a PIN to access the app, and on the iPhone, you can use FaceID or TouchID. A home-screen widget keeps it ever at the ready.
When you use Google Authenticator to log in to your Google account, you enter the six-digit code shown in the authenticator app, just as you would to log in to any other service. The app also lets you import logins from an old phone to a new one if you have the former on hand. As with Microsoft Authenticator, there's no Apple Watch app or even an Android Wear app for Google Authenticator.
There's another common method of MFA that's not as good: authentication code by text message. Yes, your bank might send you a text message with a code that you enter into the site to gain access, and that is a type of MFA. But getting codes by phone turns out not to be especially secure. A vulnerability in SMS messaging is that crooks can reroute text messages. An authenticator app on your smartphone generates codes that never travel through the mobile network, so there's less potential for exposure and compromise. Plus, if your text messages are visible on your lock screen, anyone with your phone can get the code.
To set up MFA by app instead of text message, go to your banking site's security settings and look for the multi-factor or two-factor authentication section. Nearly every financial site offers it. Most sites list the simple SMS code option first, but you should go past that and look for authenticator app support.
The most common way to set up MFA involves scanning a QR code on the site with your phone's authenticator app. Note that you can scan the code to more than one phone if you want a backup. Financial sites usually provide account recovery codes as an additional backup. These consist of long strings of letters and numbers. Save those account recovery codes somewhere safe, such as in a password manager. The codes work in place of an MFA code on your phone, which means they let you still log in to the site if your phone is lost, stolen, or busted.
Something to look for when choosing an authenticator app is whether it backs up the account info (encrypted) in case you no longer have the same phone on which you originally set it up. All of the apps included here now have this capability, with Google Authenticator being a recent latecomer to the party.
As mentioned, we prefer that authenticator apps do not use codes sent by SMS during setup to authenticate you or your device. Most authenticator apps don't. Authy is the only app on this list that does it, but as mentioned, there's a workaround.
A final note: Be sure not to install an unknown, unrecommended authenticator app, even if it looks good. Malicious impersonators have shown up on app stores. Stick with the best authenticator apps recommended here from well-known companies.
35fe9a5643