oriXone

The iPhone is now used as a Google Security Key for 2FA authentication

2FA, authentication, Google, iPhone, key, security


From last year it was possible to use any Android phone with Android 7 or higher as a security key for two Google account authentication features. This is great progress in security and from now on most of the iPhone joins them, which can be used to sign in safely on nearby devices.

What is 2FA authorization and how to use it with Google Smart Lock

Two-factor authentication means that in addition to entering a user name and password when you sign in, it needs an extra entry point that confirms you are the right person the one who starts the session. Do not confuse this with 2-step verification, for the same, if you are just using an SMS with a temporary code. This two-step approach is sure to be better than a simple password, but it has been shown to be easy to access, so it is recommended to use two-factor authentication.

Af6e102f A0cb 403f 8e35 6eb7b1ff4855 Two-factor authentication using iPhone and Google Smart Lock app. With 9to5google.

Specifically, the two-factor validation does Use the second device managed by the account user to confirm login. With iCloud for example we have to enter the code from our devices whenever we start a new session. But it can also be just a USB keychain (in fact we recently saw Safari already compatible with them) or a nearby accessory or device. An example is mobile.

In the case of Google and thanks to its Google Smart Lock program, users when starting a new season can Verify in 2FA by opening the app on iPhone and confirming login. In order for a sign-in request to occur, the iPhone must be on the Bluetooth list of the device where you want to log in and obviously Bluetooth is enabled on both computers.

To start using this new feature we have to update the Google Smart Lock app to be published 1.6 It is currently running when you sign in to Chrome on computers near the iPhone. Application use the iOS Safe Enclave safeguarding data and preventing unwanted access.

Via | 9to5google

Leave a Comment