Two-Factor Authentication
Protect your account with 2FA. Setup authenticator apps, generate backup codes, and recover access if you lose your device. TOTP and SMS options available.
Password alone isn't enough. If someone gets your password (phishing, data breach, keylogger), they own your account. Two-factor authentication stops them cold.
How 2FA Works
Login requires two things:
- Something you know: Your password
- Something you have: Your phone (authenticator app) or phone number (SMS)
Attacker with your password still can't log in without your phone. 99.9% of account takeovers blocked.
Choosing a 2FA Method
We support two methods:
TOTP (Time-Based One-Time Password) - Recommended
- Uses authenticator app (Google Authenticator, Authy, 1Password)
- Generates 6-digit codes that change every 30 seconds
- Works offline (no internet needed)
- Most secure option
SMS (Text Message)
- Sends 6-digit code to your phone number
- Requires cell signal or WiFi calling
- Vulnerable to SIM swap attacks
- Better than nothing but not recommended
Use TOTP unless you absolutely can't install an authenticator app.
Setting Up TOTP (Authenticator App)
Step 1: Install Authenticator App
Recommended apps:
- Google Authenticator: Free, simple, works offline
- Authy: Free, cloud backup, multi-device
- 1Password: Paid, integrates with password manager
- Microsoft Authenticator: Free, push notifications
Download from App Store or Google Play.
Step 2: Enable 2FA in Multilogin
Settings → Security → Two-Factor Authentication → "Enable 2FA" button.
You'll see a QR code and a manual setup key.
Step 3: Scan QR Code
Open your authenticator app → Add account → Scan QR code → Point camera at screen.
The app shows "Multilogin.io" with a 6-digit code that changes every 30 seconds.
Can't scan? Use manual setup key instead. Copy the long alphanumeric string and paste into your app.
Step 4: Verify Setup
Enter the 6-digit code from your app. Click "Verify and Enable."
If code works, 2FA is enabled. If not, check:
- Clock on phone is accurate (TOTP is time-based)
- You're entering the code quickly (expires in 30 seconds)
- You scanned the correct QR code
Step 5: Save Backup Codes
Download 10 backup codes. Each code is single-use. Store somewhere safe (password manager, encrypted file, physical safe).
⚠️ Critical
Save backup codes NOW. If you lose your phone, backup codes are the only way to access your account. Without them, you're permanently locked out.
Setting Up SMS
Settings → Security → Two-Factor Authentication → Select "SMS" → Enter phone number.
We send a verification code to your number. Enter code to verify.
After setup, login sends SMS with 6-digit code. Enter code to complete login.
SMS Limitations:
- SIM swap attacks can intercept codes
- Doesn't work in areas with no cell service
- SMS delivery can be delayed (minutes)
- International SMS may fail
Logging In with 2FA
Login Flow:
- Enter email and password
- System prompts for 6-digit code
- Open authenticator app → Get current code
- Enter code (must be done within 30 seconds)
- Check "Trust this device for 30 days" if it's your personal computer
- Click "Verify"
Trusted devices don't ask for 2FA code for 30 days. Public computers should never be trusted.
Using Backup Codes
Phone lost or broken? Use backup codes.
Login normally → Enter backup code instead of authenticator code.
Each backup code works once. After using 5 codes, generate new set: Settings → Security → 2FA → "Regenerate Backup Codes."
Account Recovery
Lost phone AND lost backup codes? You're in trouble.
Recovery Options:
- Contact Support: Email support@multilogin.io with account proof (payment receipts, old profile names, API keys). We verify identity manually. Takes 3-5 business days.
- Security Questions (if enabled): Answer 3 security questions to disable 2FA.
Prevention:
- Store backup codes in password manager
- Use Authy with cloud backup (syncs to multiple devices)
- Enable security questions as backup recovery method
- Note down your setup key (can re-add to new phone)
Disabling 2FA
Settings → Security → 2FA → "Disable Two-Factor Authentication" button.
Enter current password and 2FA code to confirm.
When to disable:
- Switching to different authenticator app
- Replacing lost phone
- Account transfer
Re-enable immediately after resolving the issue.
2FA for Team Members
Owner can enforce 2FA: Settings → Team → Security Policies → "Require 2FA for all members."
Team members get 7 days to enable 2FA. After deadline, they're locked out until they enable it.
Strongly recommended for:
- Teams handling sensitive client data
- Compliance requirements (SOC 2, ISO 27001)
- High-value accounts (>$10k monthly revenue)
Best Practices
- Use TOTP, not SMS
- Store backup codes in password manager
- Don't trust public computers
- Enable 2FA on email account too (attacker with email access can reset passwords)
- Use different authenticator from email (diversify risk)
- Test backup codes annually (make sure they work)
Tyler Johnson
Identity & Access Management Lead
Tyler Johnson builds authentication systems at Multilogin.io. He's implemented 2FA for 50,000+ accounts and reduced account takeovers by 99.7%.