Two-step verification
Two-step verification (also known as two-factor authentication) is a process involving two stages to verify the identity of an entity trying to access services in a computer or in a network. This is a special case of a multi-factor authentication which involves the presentation of two or more of the three authentication factors: a knowledge factor, a possession factor, and an inherence factor.[1][2][3]
To provide an everyday example: an automated teller machine (ATM) typically requires two-step verification. To prove that users are who they claim to be, the system requires two items: the ATM card (application of the possession factor) and the personal identification number (PIN) (application of the knowledge factor). In the case of a lost ATM card, the user's accounts are still safe; anyone who finds the card cannot withdraw money as they do not know the PIN. The same is true if the attacker has only knowledge of the PIN and does not have the card. This is what makes two-step verification more secure: there are two layers of security.
Google's two-step verification process
Google allows users to use a two-step verification process. To access a Google service using the two-step verification process, a user has to go through the following two stages:[4][5]
- The first step is to log in using the username and password. This is an application of the knowledge factor.
- The implementation of the second step requires a mobile phone or the Google Authenticator application, which is an application of the possession factor. If the user opts to use a mobile phone, he/she has to register his/her phone number with Google. When we attempt to authenticate with username and password, Google will send via SMS a new, unique code to the phone. If the user opts to use the Google Authenticator (or another supported code generator application),[6] he/she simply opens the application, which generates a new code every 30 seconds. This code is to be entered to complete the log in process. As a backup option in case the registered mobile phone or device running Google Authenticator is lost, stolen, or otherwise unavailable, the user can print a set of static single-use backup codes and store them in a safe place.
Other sites offering two-step verification service
The following are some other sites which offer two-step verification service:[7]
- Amazon Web Services
- ANX
- App.net
- Apple ID
- Bitstamp
- Buffer[8]
- Dashlane[9]
- Dropbox
- eBay
- Etrade
- Evernote
- Gandi[10]
- GitHub
- GoDaddy
- HootSuite
- Lastpass
- LocalBitcoins
- Microsoft[11]
- MtGox
- PayPal
- WordPress
- Yahoo! Mail
References
- ↑ Alex Colon. "What is two-step authentication?". Retrieved 23 October 2013.
- ↑ "Two-Step Authentication". Stanford University. Retrieved 23 October 2013.
- ↑ James Tarala. "Two-Step Verification". Brown University. Retrieved 23 October 2013.
- ↑ "Google 2-Step Verification". Google. Retrieved 24 October 2013.
- ↑ "About 2-step verification". Google. Retrieved 24 October 2013.
- ↑ https://support.google.com/accounts/answer/180744?hl=en
- ↑ Whitson Gordon. "Here's Everywhere You Should Enable Two-Factor Authentication Right Now". Lifehacker. Retrieved 24 October 2013.
- ↑ Belle Beth Cooper. "Introducing 2 Step Login for Buffer: The safest social media publishing on the web". The Official Bufferapp Blog. Retrieved November 26, 2013.
- ↑ https://www.dashlane.com/security
- ↑ "Activating two-factor authentication". Gandi's Online Documentation Wiki. Retrieved February 2, 2014.
- ↑ Eric Doerr. "Microsoft Account Gets More Secure". The Official Microsoft Blog. Retrieved 24 October 2013.