With 83% of organizations now requiring multi-factor authentication (MFA), in keeping with JumpCloud’s 2024 IT Developments Report, extra workers are pushed to make use of Microsoft Authenticator or comparable instruments to safe their work accounts. So it’s solely pure to ask, “How do authenticator apps work?”—whether or not you’re curious or privacy-conscious.
On this information, we’ll focus on authenticator apps and the way they work, plus how they outclass different MFA choices like SMS and e-mail. We’ll additionally cowl their disadvantages and a few finest practices for authenticators earlier than wrapping up with a listing of one of the best apps and a few regularly requested questions (FAQs).
What are authenticator apps, and the way do they work?
Authenticator apps are free cell purposes that generate momentary codes to log into accounts secured with multi-factor authentication (MFA). Principally, they supply an additional layer of safety in case an attacker obtains your password.
However how do authenticator apps work? Right here’s a fast rundown of the method:
- First, you activate MFA in your chosen account. The location exhibits a QR code that holds a secret key.
- You open your authenticator app and scan the QR code. The app will use the important thing to create time-based one-time passwords (TOTPs) later.
- Now, the service and your app have the identical key, which is saved in an encrypted format in your machine and the authentication server. This prevents anybody, together with hackers or rogue workers, from studying it and accessing your account.
- Your app’s algorithm makes a brand new 6-digit code each 30-60 seconds utilizing the saved key and the present time.
- When you log in as standard, you’ll be requested to enter the code from the app.
- The location makes its personal code the identical method and checks if it matches yours. If it does, you’re in. If not, you’re blocked.
Some providers make MFA simpler by sending a push notification to your authenticator app as a substitute of asking you to sort a code.
To do that, the server shops your app’s ID and makes use of it to achieve your telephone throughout login. When the notification seems, you unlock the app and enter a code or faucet an identical quantity. The app then sends your response again to the server to complete the login course of.
Now that you understand how authenticator apps work, let’s have a look at why they’re thought-about safer than different two-factor authentication (2FA) choices.
How safe are authenticator apps?
The most important benefit of authenticator apps over SMS or email-based 2FA is that no knowledge is transmitted between you and the authentication server. When you scan the preliminary QR code, the key key stays encrypted in your machine and the server.
In the meantime, SMS and e-mail 2FA are weak to:
- Phishing assaults: Attackers might trick you into coming into your code on a faux login web page. When you sort it in, they use it instantly to entry your account.
- SIM swapping: Somebody convinces your cell service to switch your quantity to their SIM card. They then obtain your 2FA codes by textual content, permitting them to interrupt into your accounts.
- Man-in-the-middle (MITM) assaults: An attacker intercepts the connection between you and the web site, stealing your password and the code you enter throughout login.
Furthermore, authenticator codes reset in 30-60 seconds, making them practically inconceivable to seize or reuse. Even higher, authenticator apps like Authy or Auth0 embrace biometric checks (e.g., fingerprint, Contact ID, Face ID). That method, your accounts aren’t uncovered if somebody positive factors entry to your telephone.
Safety apart, they’re a extra dependable possibility as you get the codes straight from the app, no community wanted. You understand how irritating SMS may be should you’ve been caught making an attempt to log in someplace with no sign or sluggish supply. Authenticator apps keep away from all that.
How you can use authenticator apps safely
Listed here are some suggestions to remember to keep away from shedding entry to your MFA-secured accounts:
- Retailer your backup codes securely: Once you allow multi-factor authentication (MFA), most providers will present backup codes in case your machine is stolen or misplaced. We suggest encrypting the backup codes with a robust password. Holding them in a plain .txt file in your system defeats the aim of utilizing an authenticator.
- Lock down your telephone: Select a protracted, distinctive password or use fingerprint or face unlock to maintain out intruders. Some authenticator apps additionally provide biometric safety.
- Maintain issues updated: To maintain your authenticator app working correctly, set up updates as they develop into accessible. These assist the app keep in sync, run easily, and patch safety points. The identical goes for smartphone system updates.
What are the disadvantages of an authenticator app?
The principle draw back of an authenticator app is shedding entry to your logins. It’s possible you’ll get locked out should you lose or swap telephones or delete the app with out backing it up. Some apps don’t help cloud backup or syncing, and never all providers provide backup login choices.
Then there’s the added time throughout login. You need to open the app, discover the right account, and enter the code earlier than it expires. It’s a brief delay, however nonetheless additional effort, particularly should you’re logging in usually or juggling a number of accounts.
Enterprise-focused authenticator apps can get costly for organizations. Some cost month-to-month charges per person, particularly for enterprise options like admin instruments or machine administration. Setting them up, coaching workers on how authenticator apps work (particularly extra complicated techniques), and dealing with misplaced entry additionally take effort and time.
After all, these points are minor in comparison with the injury attributable to a safety breach. Resetting dozens of passwords, shedding entry to necessary accounts, or coping with enterprise disruptions may be much more annoying and expensive than the hassle required to make use of an authenticator app.
What’s one of the best authenticator app?
We’ve beforehand lined one of the best authenticator apps, so it’s best to take a look at that information for the total particulars. In case you’re quick on time, listed here are the highlights:
- ManageEngine ADSelfService Plus: Runs on Home windows Server. Really useful for bigger organizations. It comes with single sign-on (SSO) and MFA, together with letting customers reset passwords and deal with account duties themselves.
- LastPass: Provides a cloud service that lets customers securely share passwords throughout a number of gadgets. It really works nicely for groups who want a simple and safe technique to share credentials.
- Auth0: Focuses on managing SSO for cloud apps, giving builders a technique to defend entry on the software degree. It’s cloud-based and matches nicely with apps that want versatile id administration.
- OneLogin: Supplies authentication providers from the cloud that mix VPN-like safety with software rights administration. It allows you to management which customers can see and use particular apps, serving to cut back unauthorized entry.
- Authy: Shops backup codes securely within the cloud whereas making MFA easy on cell gadgets. It affords additional options like machine syncing to keep away from shedding entry when switching telephones.
- RSA SecurID: Helps multi-factor authentication with an possibility for a bodily token that generates entry codes. It’s a stable alternative for organizations that want hardware-based safety.
- Okta: A cloud-based login device for companies with SSO and MFA help. It handles logins, additional verification steps, and retains person accounts up to date when folks be a part of or depart. Works with plenty of apps and blocks suspicious login makes an attempt.
- Google Authenticator: A free, simple authenticator for Android and iOS that’s nice for particular person customers and small companies alike. That stated, it’s a bit extra restricted in scope than different choices.
Ceaselessly requested questions
How does an authenticator app work with out web?
Authenticator apps work with out web through the use of the present time and a saved secret key to generate codes. The codes don’t come from a server—they’re created in your machine, so that you don’t want Wi-Fi or knowledge for them to indicate up.
Can authenticator apps observe you?
Authenticator apps don’t observe you. They don’t want GPS or location entry, and so they don’t acquire knowledge about what you log into. Most simply retailer a key and present you time-based codes when wanted, nothing extra.
Do authenticator apps retailer passwords?
Some authenticator apps (akin to Microsoft Authenticator) additionally retailer passwords. Principally, they act as password managers alongside their standard time-based code perform. Alternatively, password administration providers like LastPass and NordPass provide built-in authenticators, so you possibly can handle each passwords and 2FA codes in a single place.
Can somebody entry my authenticator app?
Somebody may entry your authenticator app in the event that they get into your unlocked telephone, as most apps don’t require a PIN or fingerprint to open. Then once more, with out your account password, the codes alone normally aren’t sufficient to log in. Both method, think about an authenticator with biometric 2FA for additional safety.

