What is Google Authenticator? | Definition from TechTarget (2024)

What is Google Authenticator? | Definition from TechTarget (1)

By

  • Robert Sheldon

What is Google Authenticator?

Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources. An authenticator is considered to be a more secure approach to 2FA than using Short Message Service (SMS), i.e., text messages, as the second form of verification. Text messages can be monitored and intercepted, and hackers can trick carriers into switching phone numbers to new devices.

The importance of two-factor authentication

In general, 2FA is considered a better option than single-factor authentication (SFA), which typically involves a username and password. Two-factor authentication reduces the likelihood that an intruder can masquerade as an authorized user.

The importance of 2FA came to light in a February 2022 blog post by Guemmy Kim, then-director of account security and safety at Google. Google had automatically enrolled users in 2FA the previous year, according to Kim. After over 150 million people were set up with 2FA, Google saw a 50% decrease in the number of accounts being compromised.

Two-factor authentication requires a user to provide two types of verification when logging onto a website or online service. For example, a username/password login would represent one type, and a passcode texted to the user would represent the second type. These authentication types -- referred to as factors -- help verify that the user trying to connect to a secure site or service is who they claim to be.

What is Google Authenticator? | Definition from TechTarget (2)

There are three categories of authentication factors:

  • Knowledge factors. Credentials that the user knows, typically a username and password.
  • Possession factors. Things that the user has, typically a smartphone.
  • Inherence factors. Things that the user is, typically a biometric characteristic such as a fingerprint or iris pattern.

The use of knowledge factors has been a common practice since the early days of the web, with many sites and services requiring a username and password. In most cases, only the password represents the secure component. A username might be as simple as an email address, which is often publicly known or easily acquired. The password must always remain secret and secure to protect resources. If it is compromised, those resources can be put at risk.

Unfortunately, passwords can often be a weak link in network and data protection, especially when combined with poor password practices. A website or online service that requires only a username and password uses single-factor authentication because it relies only on knowledge factors to authenticate users. However, with the sophistication of cyber attacks, usernames and passwords alone are not enough to fully protect resources, and many online systems now require 2FA or at least offer it as an option.

Today, most implementations of two-factor authentication use the username/password logon combination as the first factor, and the second factor is a temporary passcode that the user must enter along with the logon information. The user receives the passcode on his or her device, either as a text message or through an authenticator app such as Google Authenticator. The passcode is good for a limited amount of time. The device that receives the text represents something that the user possesses, typically a smartphone, which qualifies as a possession factor in 2FA.

How does Google Authenticator work?

Most organizations are aware that passwords are easily compromised and have implemented 2FA on their sites or services. They often include support for an authenticator app such as Google Authenticator, which runs on the user's iOS or Android device. Because the majority of exploits are conducted via the internet, it is unlikely that the hacker can also access the user's physical device.

Today, Google Authenticator is used extensively for websites and online services that have enabled 2FA. The app generates a one-time passcode (OTP) for each site or service that the user has registered with the authenticator. The passcodes are six-digit numbers that are refreshed every 30 seconds.

Here's how to use Google Authenticator to sign into a site or service that has implemented 2FA:

  • Install Google Authenticator on the user's iOS or Android device. This step is only necessary once.
  • Enable 2FA on the user account associated with the target site or service. The user will be provided with a QR code, setup key or both. The QR code is usually easier to work with.
  • Open Google Authenticator on the mobile device and tap the plus sign in the lower right corner to add the target site or service. The user is presented with two options:
    • Scan a quick response code (QR code). Select the option and aim the device at the QR code to capture its image.
    • Enter a setup key. Select this option, type a name for the login, and then type the setup key.
  • Google Authenticator will create the login and display its first OTP.
  • Return to the target site or service and complete the process of setting up 2FA, following the provided instructions. As part of this process, the user will need to enter the passcode that the authenticator generated.

After setting up the login on Google Authenticator, the user can use the authenticator to retrieve the latest passcode each time he or she logs into the site or service. It will be used in addition to a username and password. The site or service uses these three pieces of information to verify the identity of the person entering the login data. The authentication process works under the assumption that the user is in possession of the device on which Google Authenticator is installed.

What is Google Authenticator? | Definition from TechTarget (3)

The Google Authenticator app is based on the time-based one-time password algorithm specified in the Internet Engineering Task Force's (IETF) RFC 6238. The TOTP algorithm generates a six-digit passcode that factors in the current time of day to ensure that each passcode is unique. Passcodes are changed at regular intervals. The RFC recommends a default interval of 30 seconds.

See how to secure one-time passwords are from attacks and learn the difference between two-step verification and 2FA. Read about the most common digital authentication methods.

This was last updated in October 2023

Continue Reading About Google Authenticator

  • Apple, Microsoft, Google expand FIDO2 passwordless support
  • 7 mobile device security best practices for businesses
  • 5 common authentication factors to know
  • In biometrics, security concerns span technical, legal and ethical
  • The pros and cons of biometric authentication

Related Terms

identity provider
An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of ...Seecompletedefinition
password spraying
Password spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target ...Seecompletedefinition
phishing
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...Seecompletedefinition

Dig Deeper on Identity and access management

  • one-time passwordBy: KathleenRichards
  • possession factorBy: RahulAwati
  • two-step verificationBy: IvyWigmore
  • authentication factorBy: IvyWigmore
What is Google Authenticator? | Definition from TechTarget (2024)

FAQs

What is Google Authenticator? | Definition from TechTarget? ›

Google Authenticator app is based on the time-based one-time password algorithm where a user inputs a time-based one-time password to verify their identity.

Why would someone use Google Authenticator? ›

The Google Authenticator app can generate one-time verification codes for sites and apps that support Authenticator app 2-Step Verification. If you set up 2-Step Verification, you can use the Google Authenticator app to generate codes to sign in to your Google Account.

Is Google Authenticator legitimate? ›

Google Authenticator is a streamlined, straightforward authentication app with a surprising number of useful features. But users should be aware of how it secures its backups.

What companies use Google Authenticator? ›

Customers of Google Authenticator

Around the world in 2024, over 185 companies have started using Google Authenticator as Two Factor Authentication tool. Goldman Sachs Group, Inc. AT&T, Inc. Adobe, Inc.

What is my Google Authenticator account? ›

Google Authenticator is an app for adding a more advanced layer of protection for online account sign-up using two-factor authentication (2FA).

Why avoid Google Authenticator? ›

Backup is cumbersome.

Also, the services often offer reserve codes instead of explicitly suggesting to save the secret. If you lose your secret and log in with a reserve code, you will have to redo the entire TOTP registration process again. Backup codes are sent online, which is often insecure.

Can someone access my Google Authenticator? ›

Anyone with physical access to your phone has access to your 2FA accounts with Google Authenticator.

Is Google authentication safe? ›

Is Google Authenticator safe? Google Authenticator is considered to be a safe app. However, two-factor authentication is not a panacea for all security ills, and Google Authenticator should also be used while keeping its limitations in mind .

How do I remove Google Authenticator? ›

Deleting Google Authenticator
  1. Access the Google Authenticator app in the device you wish to unlink.
  2. Click the pencil icon (Top right)
  3. Select which token you wish to remove.
  4. Then click delete (bottom of screen)
  5. This message will display.
  6. Click Remove Account.

How safe is the authenticator app? ›

Are Authenticator Apps Secure? Authenticator apps are secure because they keep the code local to your device and the codes are not sent unencrypted over the internet. This means they can't be intercepted through common cyber attack methods.

What are the security issues with Google Authenticator? ›

In 2020, Android malware was found stealing one-time passwords from Google Authenticator. Moreover, the lack of additional security layers has been noted, specifically the lack of passcode or biometric security on the app which only raises the risk to organizations if a device is stolen or lost and infiltrated.

What information does Google Authenticator use? ›

Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password (TOTP; specified in RFC 6238) and HMAC-based one-time password (HOTP; specified in RFC 4226), for authenticating users of software applications.

Why do I keep getting a Google verification code? ›

Receiving unsolicited two-factor authentication codes can indicate someone is trying to access your account, but it may also be a technical glitch. To ensure your account's security, change your password, review recent activity, and contact the platform's support team to report the issue and request assistance.

Why would someone need an authenticator app? ›

An authenticator app is a mobile application that provides an extra layer of security to your online accounts by generating time-based one-time passwords (TOTPs). These passwords are used for two-factor authentication (2FA) and help protect your accounts from unauthorized access.

What is Google Authenticator code used for? ›

Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources.

What is the advantage of Google Authenticator? ›

Authenticator apps offer several advantages over other forms of two-factor authentication. First, they work offline, meaning you don't need an internet connection to generate code. Second, they are more secure than SMS-based authentication because short message service (SMS) can be intercepted.

What happens if I delete Google Authenticator? ›

If you accidentally uninstall the Authenticator app from your smartphone you will need to re-install it and then run through the setup below. One you have scanned the QR code continue with the setup on the laptop.

Top Articles
Hundreds of thousands to escape mortgage crisis in boost for house prices
Hardware Wallets vs. Software Wallets: What’s the Real Difference?
It’s Time to Answer Your Questions About Super Bowl LVII (Published 2023)
Kevin Cox Picks
Brendon Tyler Wharton Height
THE 10 BEST Women's Retreats in Germany for September 2024
Volstate Portal
Prices Way Too High Crossword Clue
[PDF] INFORMATION BROCHURE - Free Download PDF
How To Delete Bravodate Account
Hmr Properties
2016 Hyundai Sonata Price, Value, Depreciation & Reviews | Kelley Blue Book
Seattle Rpz
Mary Kay Lipstick Conversion Chart PDF Form - FormsPal
Christina Khalil Forum
Po Box 35691 Canton Oh
Ess.compass Associate Login
Spider-Man: Across The Spider-Verse Showtimes Near Marcus Bay Park Cinema
Shasta County Most Wanted 2022
Persona 4 Golden Taotie Fusion Calculator
Satisfactory: How to Make Efficient Factories (Tips, Tricks, & Strategies)
Phoebus uses last-second touchdown to stun Salem for Class 4 football title
Phantom Fireworks Of Delaware Watergap Photos
Mals Crazy Crab
Keyn Car Shows
Culver's.comsummerofsmiles
Goodwill Of Central Iowa Outlet Des Moines Photos
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Hrconnect Kp Login
Motorcycle Blue Book Value Honda
manhattan cars & trucks - by owner - craigslist
UAE 2023 F&B Data Insights: Restaurant Population and Traffic Data
Frequently Asked Questions - Hy-Vee PERKS
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Steven Batash Md Pc Photos
Selfservice Bright Lending
Nacho Libre Baptized Gif
Keeper Of The Lost Cities Series - Shannon Messenger
Midsouthshooters Supply
KM to M (Kilometer to Meter) Converter, 1 km is 1000 m
“Los nuevos desafíos socioculturales” Identidad, Educación, Mujeres Científicas, Política y Sustentabilidad
Mathews Vertix Mod Chart
Woody Folsom Overflow Inventory
Autozone Battery Hold Down
FedEx Authorized ShipCenter - Edouard Pack And Ship at Cape Coral, FL - 2301 Del Prado Blvd Ste 690 33990
About Us
Vagicaine Walgreens
Random Animal Hybrid Generator Wheel
Aaca Not Mine
Tyrone Dave Chappelle Show Gif
Costco Gas Price Fort Lauderdale
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 5696

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.