![]() If the loss of the authenticator blocks your account access, for example with a corporate or small public service that lacks an automatic procedure for restoring access, contact a local administrator or support service and explain what happened. It shouldn’t take long, and soon you’ll be able to sign in to your account. Select the most convenient option - most services can deliver the code by text, voice call, or e-mail -and wait for it to arrive. To do this, start the account login process by entering your username and password, and when you need to enter a one-time code from the authenticator app, look for a “Try another way” (or similar) link. If it’s an account with a major public service (e.g., Google, Facebook, Instagram) and your account is linked to your e-mail or phone number, you can easily restore access using an alternative authentication method. What you can do now is restore access to your account. If you’re not logged in elsewhere and you’ve lost the smartphone with the authenticator, done a factory reset, or had it stolen (basically, if you no longer have access to it), or if the above method didn’t work, you won’t be able to recover the authenticator. Recovering the authenticator without access to your account The option you need might simply not be operant on the device where you’re logged in. The problem is that not all services use the same settings in the Web version as in the mobile app. Unfortunately, this method doesn’t always work. In that case, simply enter the secret key or scan the QR code in the authenticator app on the new device and you’re all set. Some (but not all) services even display the secret key or QR code of the authenticator in the settings. For example, this option works with Google accounts if you’re logged in to even one of the company’s apps, such as YouTube. The item you need is usually somewhere on the Security tab. Open your account settings and reset the authenticator - that is, link it to the app on the new phone. If you’re still logged in to the account on another device, you may be in luck. Recovering the authenticator if you are logged in to the account on another device If you no longer have access to the smartphone on which the authenticator app is installed, your next steps depend on whether you’re still signed in to the account you need to log in to on another device. Recovering the authenticator without access to your smartphone But what if your phone, and along with it the authenticator app, gets lost, broken, or stolen? In that case, you have several options. One of the most convenient 2FA methods is to use an app that generates one-time codes, such as Google Authenticator and the like. It is vital to protect accounts with two-factor authentication: If your password gets leaked (and leaks are very common), 2FA will safeguard your accounts against hacking. ![]() KasperskyPremium Support and Professional Services.KasperskyEndpoint Security for Business Advanced.KasperskyEndpoint Security for Business Select.For more details, go to Avoid account lockouts when 2-Step Verification is enforced. If you move users into a configuration group or change their organizational unit and 2-Step Verification isn’t required, their accounts are no longer protected by 2-Step Verification. Accounts are still protected by 2-Step Verification, and backup codes are easy to generate. If you need to recover an account, use backup codes. For details, go to Deploy 2-Step Verification. Users can enter a backup code for 2-Step Verification during the grace period. If security keys are required, set up a grace period-When you set up enforcement for 2-Step Verification, set up a grace period.Set up an additional administrator-If an administrator can’t sign in to their administrator account, another administrator can generate backup codes for them.See the instructions in User account on this page. Generate codes for a user-If a locked-out user doesn't have backup codes, you can generate codes for them.Save backup codes ahead of time-Administrators and users should generate and print backup codes in case they’re needed in the future.Administrators should have a spare security key-Administrators should enroll more than one security key for their administrator account and store it in a safe place.A newly-created user can't sign in to their account to set up 2-Step verification.A user doesn’t enroll in 2-Step Verification by the end of the new user enrollment period.A user loses their phone and can't generate 2-Step Verification codes.An administrator or user loses their security key.If 2-Step Verification is enforced at your company, administrators or users won’t be able to sign in to their accounts if they lose access to their method, or haven't set up 2-Step verification.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |