Two-factor authentication
Unfortunately, passwords are often easy for attackers to hack. Two-factor authentication offers more protection. We show you how it works.
Better safe than sorry
You have an account and authenticate yourself as the authorized owner of this account when logging in with your username (usually your e-mail address) and your personal password.
The problem is that e-mail addresses are unfortunately easy to guess and passwords are often easy to crack. Two-factor authentication (also known as 2FA) offers stronger protection.
Two-factor authentication is an additional security measure to protect your account. Even if your password falls into the wrong hands, unauthorized persons still have no access to your account. They will still lack the necessary second factor for a successful login.
Two-factor authentication is therefore simply an additional security measure to protect user accounts.
PC + smartphone = better protection
In addition to the password, you must enter a one-time code that is valid for a short time when logging in. One-time codes are created by so-called authentication apps. Such apps offer the additional advantage that you can use them to manage all your 2FA-protected accounts clearly.
Well-known apps for two-factor authentication include Google Authenticator (for iOS/Android), Microsoft Authenticator (for iOS/Android) or Twilio Authy (for iOS/Android/desktop).
During registration of your chosen Authenticator app, the website - for whose account you want to set up a second factor - displays a QR code. You photograph this using the camera on your smartphone and the app is set up as a second factor for authentication.
Each time you log in, the app calculates a six-digit code that users enter in the login screen of the respective website. This code is only valid for a short time. The procedure is standardized and the apps work for every website.
First step:
Second step:
Security first: Authentication via a security token
Another 2FA method is authentication via a security token. A security token as a second factor for logging in is either a software token or a hardware token. If you use a software token, biometric data is compared. You can use either the fingerprint scanner or facial recognition (via webcam) on your computer. A hardware token, also known as an "electronic key", is used like a USB stick.
Two-factor authentication via hardware token
A hardware token looks like an ordinary USB stick, but works differently. A digital security key is programmed into the hardware token; data cannot be stored on it.
To initialize it, insert this stick into the USB port of your computer. After entering your user name and password on the login page, press a button on the stick when prompted. That's it.
Two-factor authentication by matching biometric data
Biometric data is an ideal authentication method. To identify or authenticate a user, websites or applications either require a fingerprint in addition to a username and password or they scan and check the user's face.
The comparison of biometric data is managed by the operating system of your computer/laptop/tablet.