Two-factor authentication, also known as 2-factor authentication or 2FA for short, is a security measure. It protects online accounts from illegal access by requesting two factors. A login is therefore only possible if both factors are known. We explain how this works in this article.
The double security level
Most online accounts are protected in a simple way: There is the user name – in combination with the e-mail address – and a freely selectable password. Passwords are sometimes more and sometimes less secure. “12345” obviously offers less protection than “2-FaKt0r-AutH3nt1f12Ierung_SCHU3tzT!”. But no matter how complex a password may be, it does not offer impenetrable protection. This is where two-factor authentication comes into play. This is an additional layer of security for an online account that guarantees that only the user has access. As a result, all data on the account is protected and the data required to log in cannot be viewed. This is referred to as a security token. Security tokens are an integral part of two-factor authentication systems such as the REINER SCT Authenticator. To access such a security token, you must use a device that belongs to you and to which you have access. You have probably been familiar with this procedure from ATMs for many years. There you need your bank card to withdraw money. The pin alone is not enough. So two factors are necessary to get the money from the ATM. In the case of two-factor authentication for online accounts, for example, you need your smartphone or an authenticator directly to complete an additional verification. So if you want to log into your online account, you will need to enter your password, but you will also be asked for further verification. Two-factor authentication with the REINER SCT Authenticator In the case of the REINER SCT Authenticator, the device with which you use the security token is the Authenticator itself. However, it is also ideal for explaining how 2FA works in practice using an example. You can enter your Internet accounts on the Authenticator. Basically, it’s like a smartphone on which you have saved your apps. The difference is that you do not access your apps directly via the Authenticator. You continue to do this via your smartphone. Let’s assume you want to log into your email inbox. Then go to the relevant app on your smartphone or laptop as normal and enter your user name and password. However, before you can access your mailbox, two-factor authentication is activated and asks you for a confirmation code. You will receive this from your authenticator. In the Authenticator, select the relevant account for your e-mail inbox. The authenticator then creates a so-called OTP code, which you must enter in the app on your smartphone or laptop to access your mailbox. OTP stands for One-Time-Pad and refers to the encryption method used to create one-time passwords. This OTP code only works once and only for this login attempt.
You are therefore the only person who knows and can use this OTP code. As an additional security measure, the authenticator uses the TOTP algorithm. TOTP stands for Time-based One-Time-Password, which already explains what it is all about: The authenticator generates a new OTP code every 30 seconds. If too much time passes, the previous OTP code is already invalid. The passwords are time-based. So basically, it is not possible for someone to gain unauthorized access to your Internet accounts and online accounts if you use two-factor authentication. This guarantees the security of your accounts.
Conclusion
Two-factor authentication, or 2FA for short, is a more than sensible security measure for your online accounts. Simple passwords are no longer secure and open the door to your accounts to attackers. 2FA is simple to use. However, as simple as it is to use, it is difficult for outsiders to circumvent the double security barrier. Accounts are therefore absolutely secure with 2FA.