Alle Zeiten sind UTC




Ein neues Thema erstellen Auf das Thema antworten  [ 1 Beitrag ] 
Autor Nachricht
 Betreff des Beitrags: steamauthenticator
Ungelesener BeitragVerfasst: Fr 17. Feb 2023, 15:13 
Offline

Registriert: Fr 17. Feb 2023, 15:12
Beiträge: 1
Best authentication software for android, ios, windows and macos If you are using two-factor authentication with in-app generated one-time codes, google authenticator is one option. Since google's awesome solution came up a little while ago, a number of alternatives have come on the scene that outperform it in terms of convenience and durability. , On the one hand, but in our time, when there are dozens of them, it is easy to get confused in the options. To let you find an authenticator that works with your operating systems, we have grouped the 10 prettiest ones by os:
Authentication apps for android: andotp, twilio authy, google authenticator, microsoft authenticator, cisco duo mobile , freeotpauthentication apps for ios 15: otp authentication, step two, twilio authy, google authenticator, microsoft authenticator, cisco duo mobile, freeotp, built-in ios authenticatorauthentication apps for windows: winauth, twilio authyauthenticator for macos: step two, otp authentication (paid version only), twilio authy
1. Google authenticator
Everyone who reads this post is probably already familiar with the very relevant google authenticator for users. However, we are not ready to write about authentication applications without mentioning it and our organization can use the google authenticator as a basis for evaluating other programs.
The ios version of google authenticator
In general, google authenticator is a convenient solution for those who do not want to resort to syncing tokens via the cloud. Instead, the application should export all the tokens created in it, creating a single qr-cipher for their bulk import to a new device. Version: for ios recently has the ability to search for tokens and protect access to the application using touch id or face id, unlike version: for android. Google authenticator still can't hide generated passwords from view, which can be problematic when you put it in public. (By the way, all android authenticators restrict screenshots, so many of the screenshots in this post are taken from ios versions of add-ons.)
– No need to create an account, - face id protection/ touch id to access the application (ios version only),- elementary search with minimal settings,- ability to export and import all tokens at once,- ability to search for named token (ios version only).
- No protection at pipeline inlet (android app),- no way to hide codes,- no backup/sync in the world,- great risk potential due to the ease of exporting tokens if the unlocked application is brought at the disposal of competitors.
Summary google authenticator lacks some healing qualities, and if you do not want to interfere with the storage of tokens in life - a good option .
2. Microsoft authenticator
Many people who want to find an alternative to google authenticator turn to microsoft authenticator solely because of the developer's reputation. They are partly justified: the microsoft application includes several useful additions to the basic set of functions. For example, it will be able to hide codes on the screen and store tokens in the world, and versions: for ios and android protect application logins. Microsoft authenticator is also needed if you always use services with microsoft accounts, and this time, no code will need to be entered, download steam desktop authenticator just start the button in the program to confirm the login.
Microsoft authenticator: not bad, but why so big?
However, this application has its flaws. First, the android and ios apps use completely incompatible cloud backup systems, and you can't transfer tokens in an additional way. For you devices with different operating systems, it can be an obstacle. Second point, microsoft authenticator requires somewhere 10 times more underground than google authenticator, 150–200 mb compared to fifteen–twenty mb. Fingerprint or face id,- backup/sync in the world,- hides codes,- no account required (if cloud backup is disabled),- significantly simplified access to microsoft account,- support for apple watch (option for ios).
- Backup/sync requires a microsoft account login (android version only),- incompatibility between ios and android backup/sync systems,- inability to export or import tokens,- large (requires 150-200 mb).
Overview microsoft authenticator makes accessing microsoft accounts much easier, but its hefty size is hard to justify - and what a useful thing cloud dslr ios and android are incompatible.
3. Twilio authy
Operating systems: android, ios, windows, macos, linux
The main advantage of twilio authy is comprehensive cross-platform support. Authy not only allows version: for such people current operating systems, but also the application easily synchronizes them all. But such quick and easy access has one drawback. For business purposes, the application requires an account associated with your phone number.
Twilio authy has mobile versions for any operating system
The application interface is significantly different from all other authenticators. Instead of a list, it has what looks like a set of tabs so that it only displays the selected token at any time, while the others are displayed under collapsible icons that you can switch between at the bottom of the screen. In the event that you personally have a lot of tokens, this can be inconvenient. Notebook users can display tokens as a list, however, this feature is not available on mobile.
- Access with pin, fingerprint or face id security,- cloud backup/ sync,- availability for every popular os,- support for apple watch (ios app),- ability to filter by token.
- Requires an account linked to phone numbers,- displays one token at a time,- inconvenience of searching for tokens,- inability to hide active token code,- inability to export and import tokens.
Overview you can't use twilio authy without setting up an account, and organizing a smartphone is not as convenient for the borrower as one would dream, however, with applications, because all oses are perfectly synchronized with each other, mobile anti-theft can be worth attention.
4. Cisco duo mobile
Duo mobile, acquired by cisco in 2018, is an important oldest authentication software. Its main advantage is a clean, comfortable and well-thought-out interface. Duo mobile also hides codes from surveillance and does not require recording. However, the software lacks other significant features: first of all, access protection, which is not in either the variant: for ios or the variant: for android.
Android version of cisco duo mobile gives users a chance « temporarily allow screenshots, ” so for a change here are screenshots of both versions
Duo mobile uses two systems for cloud backup: google cloud based on android and icloud based on ios. For this, the existing google and apple accounts of the smartphone user are used, in other words, participants do not need to organize a new account for the interaction of the application. However, users cannot sync data between android and ios variants, the program does not support exporting files, and there is no way to view the secret key or qr-cipher for already saved tokens (which can be useful if you need to perform manual synchronization).
- Clean, comfortable search,- ability to hide codes,- no need to create an account,- cloud backup/sync,- support for apple watch (version for ios).
- No access protection,- unable to export or import tokens,- incompatible backup/sync systems for ios and android.
Overview cisco duo mobile can meet your needs if you are comfortable using and want to always use only one mobile operating system.
5. Freeotp
Operating systems: android, ios
This open source authentication app was developed as soon as google closed source this authenticator code. The freeotp interface is ultra-minimalistic, there is nothing extraneous here. This minimalist approach is especially noticeable in the version: for ios, which lacks nice bonuses - for example, the ability to create a token based on a secret key, all that remains is scanning a qr code. The android version keeps both options and provides more flexibility in manually creating tokens, allowing users to choose the type of generation (totp or hotp), the number of characters in the code, the algorithm and the refresh interval for the codes. .
Freeotp is the most minimalistic open source authenticator
One of the disadvantages is the transport, which no version of the application supports cloud synchronization or export and import of tokens like a file so once you start using the app you are stuck with it. In addition, freeotp cannot set a pin code or secure communication with the application by some other method in the version: for ios, you can protect individual tokens using touch id or face id). However, the application hides computer program codes by default, and hides them automatically after 30 seconds of inactivity. The last advantage of freeotp is that the partner takes up minimal storage space, about 2-3 mb (for comparison, google authenticator requires 15-20 mb, and microsoft authenticator requires 150-200 mb).
- No need for gmail or facebook,- easy management,- hidden licenses by default,- codes are automatically hidden after 30 seconds of inactivity,- minimum memory requirements ,- touch id or face id token protection (ios version only),- ability to search named token (ios version).
- Inability to generate a token with a secret key (ios version; scan qr code required),- unable to export/import tokens,- unable to backup/sync,- no access protection.
Overview like all free source apps, freeotp is a bit quirky, but we've cut it down because its site and shared storage terms are weightless.
6.Andotp
Operating systems: android
The andotp authenticator has absolutely everything you can think of for a comfortable and secure storage of tokens, and even more. For example, andotp features include support for tags and token lookups named. If necessary, you can connect a "panic button, so that in case of emergency you can erase all tokens from the software and remove them.
Like any authenticators for android, otp blocks screenshots on the monitor with codes, here is the settings menu
The application allows you to view the secret key or qr-code for absolutely all tokens separately. You too can secure all your tokens immediately in an encrypted file on google drive - this means that with one click you can organize a backup copy in real life or export to a file. Access to the application happens to be protected by a password or fingerprint, which you use to display on your android device. However, for increased security, you have the option to set a separate pin password or a very long password specifically for andotp, as well as set up an app lock after a specific inactivity date (which you order). There are 3 or 4 more settings screens - this app is a geek's dream.
- Security access via pin or password set in the add-on, or using a pin to open the os or fingerprint ,- the ability to get acquainted with the secret code or qr-code for each token,- the ability to export all tokens at once to an encrypted file on google drive,- hide the code,- automatically hide the codes when the player inactive (for 5-60 seconds, configurable),- automatic blocking of the application when the customer is inactive (after 10-360 seconds, configurable),- flexible token search under the name or using custom tags,– the ability to use the panic button to eliminate all tokens,– flexible and numerous settings.
– Availability only for android,– ease of obtaining a key, which means an increased risk if an unlocked app will fall into the wrong hands.
Overview andotp is the most m multifunctional authenticator for android, which will certainly appeal to all fans of authentication.7. Otp authentication
Operating systems: ios, macos ($5.99)
If you are an iphone user who read the above descriptions of andotp and started to feel jealous android owners, here's good news for you: you can also add an advanced authentication add-on for ios. The creators of otp authorization clearly understand the problems of people using 2fa in many services, and therefore this application implements a folder system for the token storage company.
Otp authorization allows you to adjust the font size for one-time codes
In addition, otp-authorization allows you to view the hidden key or qr-code for each token at any time or export any of them more than in the option on the phone. The application also supports synchronization with icloud. Users can secure app login with touch id or face id or use separate login for otp authentication. We are used to the latter given the ease of exporting tokens from such an application.The only useful feature, which is not quite enough, is the ability to hide codes.
- The chance to view the secret password or qr-code of any token,- the ability to export all tokens at once to a file. ,- Icloud backup/sync,- folder system for organized storage of tokens,- apple watch support,- customize code display format,- protect access with code or touch id /face id.
– Available only for ios and macos (and only in the manner of a paid option: for macos),– unable to hide codes,– icon customization is available in paid version only,- greater potential risk due to the ease of extracting the key if the unlocked application falls into the possession of competitors.
Summary otp-authentication remains the most feature-rich authenticator for ios and also easy and convenient export of tokens.
8. Step two
Operating systems: ios, macos
If andotp seems overkill and requiring twilio authy to register scares you, but you still need an ios authenticator , and also for macos, you'll have to seriously take care of the second step. The interface is minimalistic: options: for ios and macos, it resembles an apple calculator application, and this is personally nice.
Step two: the embodiment of minimalism
To match your minimalistic interface , step two has a minimum of settings and functions, although it offers synchronization with icloud. In addition, the desktop application supports qr code scanning, which is performed using screenshots from users, permission is required, which makes this operation somewhat risky; theoretically, the above gives the program a chance to see everything that they form).
- No extra functions,- no need to create an account,- backup/sync icloud, - ability to scan qr codes (macos option),- apple watch support,- ability to filter named token.
- No access protection,- does not hide codes,- unable to export and import tokens,- maximum ten tokens in the free version,- screen capture permission is needed to check the qr code (alternative for macos).
Summary step two is a minimalistic authenticator for those who have a mac and iphone and don't need the bells and whistles.
9. Winauth
Operating systems: windows
Winauth is primarily designed for gamers. The app's unique superpower is support for custom authentication tokens in steam, battle.Net, and trion/gamigo games. In case you are looking for an alternative to steam guard, battle.Net authenticator or glyph authenticator/rift mobile authenticator, this might be the add-on for you.
Winauth is one of the few authentication apps. For windows
Of course, the application also supports standard tokens, including tokens for guild wars 2 and other ncsoft games (which for some reason the developers list separately and others: google, facebook, instagram, twitter, etc.. Winauth uses a login to visit the system and for certain tokens.The application hides the codes of computer programs by default, in particular mechanically, and allows you to encrypt the information that it stores and exports.
- Support for non-standard tokens for game services, in other words, it can replace steam guard and battle.Net authenticator, as well as glyph authenticator and rift mobile authenticator,- support for exporting a token to an unencrypted text file or an encrypted archive,- codes hidden,- automatic hiding of the code after more than ten seconds of user inactivity,- access protection via password or yubikey (i.E. U2f),- additional password protection is available for each token,- portable with flash drive and cloud storage capability,- can encrypt stored data,- ability to scan qr code from file (local or network).
– To generate a steam token, you must provide winauth with your username on a lower steam,- it is practically not recommended to use the add-on for two-factor authentication on a computer,- no version: for other oses,- larger potential risk, because because of the ease of retrieving the key if the unlocked app falls into someone's hands.
Summary gamers will like winauth because it allows them to mimic the custom tokens favored by game publishers. 10. Built-in ios and macos authenticator
Operating systems: ios (locked into the system), macos (stored in safari bookmarks)
Starting from ios 15, all types of os iphone are characterized by an internal 2fa one-time code generator.In order to find it, go to settings" → "passwords", select a saved account (or create a new one also in the "mail or social network settings" section, click "set up a verification code ...". The rest is as usual: you have the opportunity to either scan the qr code, or enter the hidden key manually, or scan the authenticator qr code directly from the camera, and at the end add the token to the existing account registration in passwords.It is inconvenient that the latter method will not prompt you to build a new account.
The built-in authenticator is now still available in macos, and more specifically in version 15 and higher of the safari browser. . To read it, open safari and in the power menu at the top of the screen, select safari → settings → passwords. Select an account (or click to create a new one), click “change clan tag, increase rank or rank, change nickname and for the workspace that appears, click “enter setup key…” (there cannot be a qr-code option). Tokens will automatically synchronize are created using icloud, so a beginner won't have to reactivate them on mac if you've already created them on iphone.
Theoretically, the built-in ios/macos authenticator supports autofill, however, together so far, in everyday life it does not work too smoothly. We did a little experiment with a twitter account and two-factor authentication using the received code. The results were mixed: when we logged into the twitter app, the system successfully entered the authentication code, when we tried to go to the twitter platform in safari, the code never showed up, whether we tried it on ios or macos.
Pros:
- Availability on every iphone (ios 15 and up) and on every mac (regardless of os, safari 15 and up), - no need to create a separate account,- ability to add a token directly from the camera (but only to an existing account registration, you cannot make a new one),- autocomplete for one -time codes,- access protection via touch id or face id,- icloud backup/sync.
Cons:
- Location deep in ios or safari settings, - displaying only a single token in one vial,- inability to hide codes,- visible account password next to the code (ios version),- storing 2fa tokens and passwords together is contrary to the principles of two-factor authentication ,- impossibility to export and import tokens .
Summary already embedding an authenticator in the os seems like a good idea. However, in this case, autocomplete is unstable and very hard to find.
Don't forget to make a backup
In conclusion, here are some tips. First, you are never constrained by using only one authentication program. One type of curtains may be ideal for some purposes, another for others. You can and must combine applications depending on individual tasks.
Secondly, we recommend paying attention to safety. Set a strong device lock and unconditionally enable application access protection, especially if you dream of using one of the authenticators that provides the ability to easily export tokens (google authenticator and otp, otp or winauth authentication). With these applications that prioritize ease of access, a potential attacker can not only steal a one-time code that works within half a minute, but also quickly clone all tokens.
Third, do not be too lazy to make a backup your tokens, especially if you have chosen the first of the applications in which you will not be able to view the hidden key or qr-password or export the tokens to a file (most of us, better to say). A backup copy will come in handy if you lose your smartphone or safely, the application will stop working correctly after a scheduled update. In most cases, restoring the authenticator without a backup will be much more difficult.


Nach oben
 Profil  
 
Beiträge der letzten Zeit anzeigen:  Sortiere nach  
Ein neues Thema erstellen Auf das Thema antworten  [ 1 Beitrag ] 

Alle Zeiten sind UTC


Wer ist online?

Mitglieder in diesem Forum: 0 Mitglieder und 0 Gäste


Du darfst keine neuen Themen in diesem Forum erstellen.
Du darfst keine Antworten zu Themen in diesem Forum erstellen.
Du darfst deine Beiträge in diesem Forum nicht ändern.
Du darfst deine Beiträge in diesem Forum nicht löschen.
Du darfst keine Dateianhänge in diesem Forum erstellen.

Suche nach:
Gehe zu:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group | made by psd-resources.de
Deutsche Übersetzung durch phpBB.de