Google Authenticator: Google's XNUMX-Step Verification

Google Authenticator

One of the tools that many services are adopting as a security measure in their places of login is the two-step verification, that is, a security mechanism that means that we have to have a device synchronized with the account. This device will give us a figure that we will have to enter once logged in to the site in order to access the desired information. If you want to protect your Google account, we will teach you how to do it after the jump, through Google Authenticator.

Two-Step Verification on Google Accounts with Authenticator

The first thing we need is to install the Google Authenticator application, which will give us the key for the two-step verification, which we will have to enter once logged in to Google. The application is adapted only for the iPhone, so we will have to look for it in the "iPhone Only" section and we will see it larger than normal.

Once the app is open, click on "Start configuration" and we have two options:

  • Scan barcode: Once we activate on our own the two-step verification in our Google account (https://www.google.es/intl/es/landing/2step/), it will give us a barcode that we can scan, instead of put all our data.
  • Manual input: If we don't want to capture the barcode, we can click on "Can't you scan the barcode?" and Google will provide you with a key of many letters that we will have to enter in «Password».

Once this step is done, the computer will ask us for a password, that password is the one provided by Google Authenticator, careful! because keys expire, that is, a key cannot be used for more than 10 seconds. We enter it in the computer and voila!

When we want to log in from any computer with the Google account, an image like this will appear:

Google Authenticator

There we will have to enter the password that you provide us at that time Google Authenticator, to offer maximum security to our account.


AirDrop for Windows, the best alternative
You are interested in:
How to use AirDrop on Windows PC
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.