Two-step verification

Two-step verification is a more secure way to protect your accounts. It combines a password (something you know) with a second factor (something you own), making it harder for attackers to gain access.

The 2 most common verification methods are:

  • Text message: A PIN code sent to your mobile phone.
  • Authenticator app: A time-based code generated on your device

Set up two-step verification

To enable two-step verification, under Settings > User settings go to Security.

Once enabled, you're asked to verify your identity with the chosen method every time you log in. You're also asked for a new code after 30 days or whenever your IP address changes.

Security settings page showing the two-step verification section with three options: Text message (low level security), Authenticator app (medium level security), and Backup codes (recovery option), each with an Enable button.

Text message

  1. Enable the Text message option.
  2. Enter your phone number and click Get code.
  3. Enter the 6-digit code you got, then click Confirm.

Authenticator app

  1. Enable the Authenticator app option.
  2. Install an authenticator app on your mobile device. We recommend Google Authenticator (iOS or Android), but any authenticator app works.
  3. Open the app and scan the QR code to get a 6-digit code.
  4. Enter the code, then click Confirm.

Backup codes

Backup codes let you log in if you don't have access to your mobile device. When you enable this option, you get 10 single-use codes. Store them somewhere secure.

Backup codes dialog showing ten 10-digit recovery codes with options to close, copy to clipboard, download, or generate new codes.

Example backup codes

📘

Note

Backup codes aren't part of two-step verification itself. They're a recovery option only. Use them if you lose access to your device.

Enforce two-step verification

You can make two-step verification mandatory for all users on a project or account. Go to Project or Account settings > Security > Two-step verification.

Two-step verification enforcement settings showing three options: Optional (selected), Mandatory for selected roles, and Mandatory for all users.

Settings can only be changed by a Project admin. There are 2 options:

  • Optional: Users can choose whether to use two-step verification (default).
  • Mandatory for all users: Every user with access to the account or project must use two-step verification.

We recommend that users download backup codes when setting up two-step verification. This option is available on the same settings page.

Force existing users to enroll

Setting two-step verification to mandatory doesn't automatically force existing users to re-authenticate or complete enrollment. Users who were already logged in when you made the change may remain active without enrolling.

To force enrollment, a Cloud Org Admin can terminate individual user sessions. Once a session is terminated, the user has to log in again and set up two-step verification before they can continue. Note that:

  • You can only terminate sessions for users in the same identity domain.
  • There's no bulk action. Sessions must be terminated one user at a time.

If terminating sessions manually isn't practical, you can wait for sessions to expire naturally instead. The default session length is 24 hours, but sessions extend as long as the user stays active. If a user opens the browser tab every day, their session can last over a month. To gauge timing, check each user's last login time before deciding whether to wait or terminate manually.

Reset two-step verification

If you change your phone number or lose your device, you need to reset two-factor authentication (2FA) to regain access. To request a reset:

  1. Submit a 2FA reset request to Support, either yourself or through a colleague.
  2. Support verifies the request and sends a confirmation email to the address associated with the account.
  3. Reply to the email to confirm the request is valid.
  4. Once support receives your confirmation, they reset 2FA for the account.
  5. After the reset, set up a new 2FA method and log in.

Troubleshooting

Google Authenticator codes not working

If your codes have stopped working or are showing an error, the most likely cause is a time sync issue.

  1. Open the Google Authenticator app.
  2. Go to the Menu > Settings > Time Correction for Codes.
  3. Click Sync Now.

This will automatically correct the time.

Sync time on your device

Go to your device's Settings > Date & Time and turn on automatic time and timezone.

Lost or damaged device

If you've lost your device or it's not working, use your backup codes to log in. This is why it's important to generate and store backup codes securely when you first set up two-step verification.