How to set up smartphones and PCs. Informational portal
  • home
  • Advice
  • Verification from google authenticator. How to add or change a backup email address

Verification from google authenticator. How to add or change a backup email address

2-Step Verification enhances account security. If it is enabled, two components are used for login:

  • Something that only you know (for example, a password).
  • Something that only you have (for example, a phone or an electronic key).

Step 1: Set up two-step verification

  1. Open the Google Account page.
  2. Safety.
  3. In chapter Sign in to your Google account click 2-Step Verification.
  4. Select To begin.
  5. Follow the instructions on the screen.

Select the second authentication step

When setting up the second stage of authentication, you can choose one of several confirmation methods: phone notification, SMS, voice call or electronic key.

After you enter your username and password on the login page, Google will send a 6-digit verification code to your phone. Enter it in the appropriate field on the screen. You can choose how you prefer to receive codes: via SMS or voice call.

Electronic key

- it small device, with which you can confirm that the Google account belongs to you. Simply connect it to your phone, tablet or computer when needed.

Electronic key provides additional protection and allows you to sign in without your phone.

Notice from Google

When you sign in to your account, you will receive a notification on your phone. Confirm it's you by selecting Yes. If you click "No", Google will understand, that someone else is trying to log into your account, and will not allow attackers to hack into it.

- safer and fast way account login than a verification code.

Step 2: Set up fallbacks

Set up backup methods for logging into your account in case you forget your password or lose your phone. To do this, follow these steps:

  1. Open the Google Account page.
  2. From the navigation bar on the left, select Safety.
  3. In chapter Sign in to your Google account click "2-Step Verification".
  4. Select To begin.
  5. Click Choose another way.
  6. Select suitable option, For example:

Step 3: Change your account recovery information

With a backup address Email and phone number, you can restore access to your account if it is hacked or you forget your password.

How to add or change a backup email address

  1. Open the Google Account page.
  2. Personal data.
  3. In chapter Contact Information select Email.
  4. Enter or update a backup email address.

How to add or change a backup phone number

  1. Open the Google Account page.
  2. On the navigation bar on the left, click Personal data.
  3. In chapter Contact Information select Telephone.
  4. Enter or update a backup phone number.

Relatively recently, Google developers began to implement Google service Authenticator, which speeds up and simplifies the work with sites and registration processes.

This is a fairly easy-to-use application that provides the ability to use the full functionality of a site without registration.

In this article, we will try to answer the question of what to do if the application is lost and how to restore access to sites in case of failure.

Principle of operation

This service provides two-step authentication for quick access to the site where you need to register.

The service is implemented in the form of an application for mobile and some other operating systems, which must be downloaded and installed before using the authenticator.

This application presents the user six or eight digit code for authentication on a particular site, instead of the standard credentials.

At the same time, after entering such a code, the user becomes authenticated in the system of a third-party site using his credentials from, that is, as a Google user.

Interestingly, the service is able to successfully generate such codes for third party applications.

Important! Initial versions of applications for this service spread from open source developer. But all newer versions Lately are already intellectual property developer, i.e. Google.

Why is it needed?

Why do you need this application and what does it do?

To start using it, you need to download the application, install it and log in using it.

After that, the application should remain running in background.

After entering a particular site, the application will generate for you special code, which will need to be entered on this site (a special input window will appear in the browser).

After entering the code, you are automatically authenticated on the site with your Google account details.

The site will also generate some digital key, which, also completely automatically, will be saved in the application you downloaded, and will be used for all subsequent logins to this site.

From everything written above, it can be seen that such an application is especially useful for those who often work with many sites that require registration to access the full functionality of the service. Such an application allows you not to waste time on constant registration and authentication, not to remember a lot of passwords and logins, but at the same time use the full functionality of any site.

Recovery

However, such an application saves the codes generated by the sites only in its memory, that is, the data is not uploaded to any servers.

Thus, they are stored only on and only as long as the corresponding application is installed on it.

It is clear that this data can be lost when the application is deleted, if the phone breaks down, which will require reinstallation operating system, when flashing.

Also, all saved data for accessing sites may be lost when the phone is physically completely out of order or when it is lost.

In this case, you completely lose access to authentication data on all sites where you authenticated using the application.

The problem is that you won't be able to access the site any other way (only if you create a new account), you can't just enter your Google credentials, as they will not allow you to enter the site. This is a particularly serious problem if the user has already performed a lot of actions in this account and it is necessary to access the information in it.

However, some ways to return access to the codes are still provided.

Basic way

You need to understand that Google does not provide absolutely no ways.

This situation occurs because passwords are not transmitted to the developer's servers in order to increase the security of using the application.

But such high reliability and safety creates a problem.

You will have to deal with each site individually.

You will need to write a letter to technical support site or its Administration, in which to describe the problem.

In some cases, this may require you to create a new empty account.

A number of sites can immediately provide you with a backup code, with which you, using Google Authenticator, can enter the site. But some services may require you to prove that you are the same user. In this case, you may need screenshots from this site when you were still using the account to which you lost access, screenshots from your Google account, etc., and the Administration may also require some other evidence.

However, some services refuse to provide reserve code despite any evidence.

Most often this happens with sites where data is entered. credit cards or any payments are made in another way.

Undoubtedly, two-factor authentication to check the security of access to your accounts is a necessary thing, but, you see, you must constantly enter verification code several times a day to go to the mail - very impractical. Just a couple of months ago, Google simplified this procedure, and in this article we will tell you how to protect your account using a smartphone as an authorization device in conjunction with two-factor authentication.

What is two-factor authentication?

First, let's understand the concept of "two-factor authentication". In most cases, we use a username and password to access our accounts. Such simple procedure has one significant disadvantage– this data can be stolen and used by third parties. Two-factor authentication provides access to personal accounts in two stages. The first stage of authentication is a login and password, the second stage is owner confirmation account via digital code(SMS, email), voice message or special device. To date, this is the most best method security authorizations. Two-factor authentication has long been offered to its users Google, Apple, Microsoft, social networks VKontakte, Twitter, Facebook and many other popular services.

Smartphone instead of code

To use your smartphone as an authorization confirmation device, you must first enable two-factor authentication Google account. This can be done both through the web interface and directly in the account settings on mobile device.

Method 1. Through the web interface
Method 2: On a mobile device
Now that you've enabled two-factor authentication, your account will be accessed in two steps. As backup method entry for the second stage Google authentication offers several options. In our case, it is necessary that the second factor instead of an SMS message with a code is a smartphone. For this we are looking for Google option Prompt and adds your smartphone there.


It is worth noting that this procedure requires a device with an active screen lock. iOS device users will additionally need to install the Google app from App Store.

How it works

After you have added your smartphone, you can try to log into your Google account through a browser on your PC. After entering your login and password, you will see a window with instructions on what actions you need to perform on your smartphone in order to log in. At the same time, the system will send you a login request to your phone. On your smartphone, you just have to confirm these actions and you will automatically be authorized in Google on your computer.

Using a smartphone as an authorization confirmation device is very convenient. But note that this method only works when active internet connection. Otherwise, you can always choose Alternative option login, for example, by a confirmation code from an SMS message.

Two-factor authentication is additional way protecting your account, such as email, cryptocurrency wallet, cryptocurrency exchange or other service that supports two-factor authentication. It is often referred to as -2FA (Two-Factor Authentication) for short. Now, after installing 2FA, when you log into your account, in addition to entering your login and password, a field appears for entering a secret one-time code(changes every 30 seconds) that comes to your phone. How to install such additional protection on the phone is described in detail in the article. But if you have any problems with your phone or for some other reason, then such additional protection can also be implemented on a computer. For implementation additional level account protection will use Google program authenticator.

How to install google authenticator on computer

We need a browser to work. Google Chrome. There is a plugin for this browser google authenticator, which we will install. In the right upper corner Chrome, click on the settings icon.
Next select " Additional settings" and "Extensions". On the page that opens, go to the very bottom and click on the "More extensions" link. The Chrome Web Store opens. At the top left, in the search field, enter "authenticator"

Do a search and find the Authenticator. On the right, click on the “+Install” button and install it as a regular Chrome extension. (In the figure, instead of the install button, the “Rate” button is drawn, because I have it installed, and you will have the “+Install” button). After installation, an icon of this extension will appear in the upper right corner of the browser. While we stop and consider general principle inclusion two-factor authentication(applies to any service). We go to the service we need and the first thing we do

  1. Enable two-factor authentication

Implementation of inclusion on different services different (but the meaning is the same), for example, on a cryptocurrency exchange it looks like this.
V personal account in the settings select " Google Protection Authenticator, SMS. Click the "google authenticator" button and generate secret code. As a result, we have a letter code and a corresponding QR code.

And here is what the inclusion of two-factor authorization in a cryptocurrency wallet looks like.

You need to go to the security center and activate 2-step verification.

So we see a QR code. That. any service, when setting up 2FA, issues a QR code, which we scan with google authenticator.

ATTENTION!!!

Be sure to take a picture of the QR code and save the file in a safe place!!!

Having a QR code YOU CAN ALWAYS RESTORE TWO-FACTORY AUTHENTICATION!

Let's imagine that something happened to the computer. You can't log in to Chrome, google authenticator has turned off, in general you can't get one-time password. And that's it. If, for example, 2FA is enabled on the blockchain wallet, then you will LOSE ALL FUNDS PERMANENTLY!

Don't think yourself too smart and ignore copying the QR code. Heaps of crypto forums are teeming with people who have lost access to 2FA (“the computer died, who did 2FA on a mobile phone, it was simply lost, etc.”). And if you have a photo of a QR code, then you can easily scan it with google authenticator either on your phone or on your computer.

2. QR code scanning

Consider the example of the yobit.net exchange. V Chrome browser click on the icon installed extension. A window opens in which we click on the pencil symbol. A window opens

Click on "+".

Select "Scan QR Code" (Scanning a QR code). Manual Entry -manual input letter code, if the service issued it. For example, the Exmo exchange issues it, but the blockchain wallet does not.

We go to the page where the QR code of the yobit exchange is shown and scan it. Circle the QR code with your mouse.

After scanning (the program read the barcode), a one-time code will appear. We insert it (see the picture above) in the "Authentication code 2fa" field and click the "Enable" button. Now, before each entry to the exchange, a field for entering the key will appear. And we will take the key itself in the application, here.

And this code changes several times a minute.

Top Related Articles