Skip to main content
All CollectionsSettingsGeneral
Two-factor authentication (2FA) Overview
Two-factor authentication (2FA) Overview
Chiayee avatar
Written by Chiayee
Updated over 2 weeks ago

Introduction

Two-Factor Authentication (2FA), also known as two-step verification or dual-factor authentication, is a security process that requires users to provide two different forms of verification to confirm their identity.

Key Benefits

  • Enhanced security for user credentials and accessible resources

  • Higher level of protection compared to single-factor authentication

  • Significantly reduces the risk of unauthorized access

  • Protection against password theft, as passwords alone are insufficient

    Two factor authentication concept illustration

Types of 2FA

Authenticator apps

Authenticator apps such as Google Authenticator or Microsoft Authenticator support 2FA by acting as the second layer of security whenever a user tries to log in. To log in, the user must complete a separate verification step, such as entering a one-time passcode generated.

SMS OTP verification

SMS, or text messaging, can be used as a form of two-factor authentication when a message is sent to a trusted phone number. The user is prompted to either interact with the text or use a one-time code to verify their identity on a site or app.

Email OTP verification

Email address can be used as a form of two-factor authentication when a message is sent to a trusted email address. The user is prompted to either interact with the text or use a one-time code to verify their identity on a site or app.

How does 2FA work?

1. Login Prompt: The user is prompted to log in by the application or website.

2. Initial Input: The user enters their credentials, typically a username and password.

3. Second Login Step: The site prompts the user to initiate the second login step.

  • This step requires the user to prove possession of something only they would have (e.g., biometrics, phone number, email address etc.). This is known as the inherence or possession factor.

4. One-Time Code: The user may need to enter a one-time code generated during the previous step.

5. Authentication: After providing both factors, the user is authenticated and granted access to the application or website.

What’s Next?

  1. Set up 2FA for your account login to secure your account

Did this answer your question?