Zipwire Documentation
Visit Zipwire
  • πŸ‘‹Welcome to Zipwire
  • Overview
    • πŸ’‘What is it?
    • πŸ™‹β€β™€οΈWho can use it?
    • ✨Our Features
    • πŸš—Can I test drive it?
      • πŸ“¦Setting up Zipwire Approve
      • πŸ“₯Setting up Zipwire Collect
    • πŸ”‘Logins & Invitations
    • 🐒Zipwire Collect: Rapid Onboarding, Effortless Compliance
    • πŸ’ΎData Ownership in Zipwire
  • Zipwire Approve
    • πŸ…How Zipwire Approve is radically different and speeds up pay day
    • β›”Why we don't track start and end times
    • πŸ“¦Unboxing key concepts
      • πŸ“œAccounts
      • ⏲️Timesheets
      • πŸ‘·Senders
      • 🚦Approvers
      • πŸ‘‘Processors
      • ‡️Workflows
      • 🏷️Assignments
      • πŸ“Billing Plans
      • πŸ’±Rate Plans
      • πŸ“¬Teams & Inboxes
      • 🏒Workplaces
      • πŸ›‘οΈClients
      • ✍️The Journal
      • 🀸Activities
      • πŸ’ΈPayment Methods
    • πŸ”²Logical structure
    • πŸ› οΈSet up your workplace
    • πŸš₯Processing stages
    • πŸ’΅Understanding invoicing
    • 🏷️Using assignments
      • πŸ–οΈHoliday assignment
  • Zipwire Collect
    • πŸ—„οΈEffortless Document Collection for Any Need
    • 🟒Get Started
    • 😭IDSP, IDVT, KYC, KYB and AML
      • 🀳Selfie Checks Powered by Yoti
      • ⛓️Blockchain Attestations
    • πŸ“„Using Packs
    • πŸ€–Machine Vision
      • 🀷Failure to Recognise
      • πŸͺͺDocument Types
    • ✍️Manual Entry for Streamlined Information Gathering
    • ✨Creating a Collection with AI
    • πŸ‘€What the Respondent Sees at Their End
    • ♻️Lifecycle of a Collection
    • 🚚Bulk Upload
    • πŸ”Document Inspection
  • Fundamentals
    • πŸ›‘οΈSecurity
      • πŸ“²Authenticator mobile apps
      • πŸ”Two factor in Zipwire
      • Wallet Connections
      • Sign-in with Ethereum
      • Attestations
        • Potential for Sleeper Wallets on Ethereum
  • Use Cases
    • 🎭Identity Checks - Right to Work
    • πŸͺͺCompliance - Know Your Customer
    • 🎨For Senders
      • πŸ’¬Sending journal updates via WhatsApp
      • πŸ€Έβ€β™‚οΈNaming activities
      • ✍️Tracking time in your Journal
      • ⏲️Send your first timesheet
    • πŸ“±Tracking time via WhatsApp
    • πŸ–₯️For Approvers
      • πŸ’¬Approving timesheets via WhatsApp
  • Troubleshooting
    • πŸ”€Tangled Identities
Powered by GitBook
On this page
  • How to set up an authenticator app for 2FA
  • Here's some basic information on TOTP:
  1. Fundamentals
  2. Security

Authenticator mobile apps

This page describes what an authenticator app is and what TOTP means.

How to set up an authenticator app for 2FA

Two-factor authentication (2FA) adds an extra layer of security to your online accounts. When you use 2FA, you need to enter both your password and a code from an authenticator app to log in.

Authenticator apps generate codes using a time-based one-time password (TOTP) algorithm. This means that the code changes every few seconds, so it is very difficult for someone to guess or intercept.

To set up an authenticator app, you will need to download an app from the app store on your phone or tablet. Once you have downloaded the app, you will need to scan a QR code or enter a code from the service you want to use 2FA with.

Two examples of TOTP authentication apps are

  • Google Authenticator

  • Microsoft Authenticator

  • Authy

  • Bitwarden

The app will then generate a six-digit code every few seconds. When you log in to the service, you will need to enter this code along with your password.

Using an authenticator app is a great way to protect your online accounts. It is more secure than using 2FA with text messages, because the identity of the mobile phone on the cellular network can be stolen or spoofed so that your private messages are routed to the baddies.

Here's some basic information on TOTP:

  • TOTP is a cryptographic algorithm that generates one-time passwords (OTPs) that are valid for a short period of time.

  • OTPs generated by TOTP are typically 6 digits long and can be used to authenticate users to online services.

  • TOTP is a secure method of authentication because it is difficult to guess or intercept OTPs.

  • Authenticator apps that use TOTP are a convenient way to generate and use OTPs.

PreviousSecurityNextTwo factor in Zipwire

Last updated 1 year ago

πŸ›‘οΈ
πŸ“²