What Is 2FA? How to Set Up Two-Factor Authentication

2FA means Two-Factor Authentication. It asks for a second proof of identity in addition to your password.

Contents

  1. What 2FA means
  2. Common 2FA methods
  3. How to set up 2FA on common websites
  4. Recommended setup
  5. What to do when you lose or replace your phone

1. What 2FA Means

2FA means Two-Factor Authentication. It reduces the damage from password leaks by requiring something else before a sign-in is accepted.

Authentication factors usually fall into three groups:

Strictly speaking, 2FA uses two different categories. Many websites also use the labels 2FA or 2-Step Verification for "password plus one-time code" flows.

2. Common 2FA Methods

MethodHow it worksStrengthsWatch out for
Authenticator app / TOTPGoogle Authenticator, Microsoft Authenticator, 1Password, Bitwarden, and similar apps generate short-lived codesWorks offline, widely supported, more reliable than SMSMigrate the app or save recovery codes before replacing your phone
Passkey / security keyA device passkey, biometric check, or hardware key such as a YubiKey verifies the sign-inStrong phishing resistance, good for critical accountsKeep a backup device or second key
Push promptA signed-in phone or app asks you to approve the sign-inConvenient for daily useNever approve a prompt you did not start
SMS / email codeThe service sends a one-time code to a phone number or email addressEasy to start withCan be affected by SIM swap, email compromise, or delivery delays
Recovery codesOne-time backup codes generated when 2FA is enabledCan save you when your phone is lostStore them offline or in an encrypted vault, not only on the same phone
App passwordsSeparate passwords for older mail clients or legacy appsSupports apps that cannot handle modern 2FARevoke them when no longer needed

3. How to Set Up 2FA on Common Websites

Account settings UIs change. Use these paths as landmarks. If a label changes, search account settings for two-factor, 2-step, login verification, or password and security.

Google / Gmail

Path: Google Account → Security → How you sign in to Google → 2-Step Verification.

Common methods: Google Prompt, Authenticator, passkeys/security keys, and backup codes. Enable an authenticator app or passkey, then save backup codes.

GitHub

Path: GitHub → Settings → Password and authentication → Two-factor authentication.

Common methods: TOTP app, SMS, GitHub Mobile, passkey/security key, and recovery codes. Developer accounts should prefer TOTP or security keys instead of relying only on SMS.

Microsoft / Outlook / Xbox

Path: Microsoft account → Security → Advanced security options → Two-step verification.

Common methods: Microsoft Authenticator, email, phone, and security keys. After enabling 2FA, older mail clients may need app passwords.

Apple Account / iCloud

Path: iPhone/iPad Settings → your name → Sign-In & Security; or macOS System Settings → Apple Account → Sign-In & Security.

Common methods: trusted-device prompts, trusted phone numbers, verification codes, and security keys. Make sure your trusted phone number is still reachable.

Facebook / Instagram

Path: usually Meta Accounts Center → Password and security → Two-factor authentication. You can enter Accounts Center from Facebook or Instagram settings.

Common methods: authenticator app, SMS, WhatsApp/login notification, recovery codes, and security keys depending on account, region, and client. Prefer an authenticator app and save recovery codes.

X / Twitter

Path: Settings and privacy → Security and account access → Security → Two-factor authentication.

Common methods: authenticator app, security key, and SMS. SMS availability can depend on account type, region, and platform policy, so prefer an authenticator app or security key.

4. Recommended Setup

  1. Use a password manager and give every important account a unique password.
  2. Enable 2FA with an authenticator app / TOTP or passkey / security key first.
  3. Save recovery codes offline or in an encrypted password vault. Do not keep the only copy as a phone screenshot.
  4. Add a backup method for critical accounts: a second security key, backup phone number, or backup authenticator device.
  5. Periodically review signed-in devices, recovery email addresses, phone numbers, and third-party app access.

5. What To Do When You Lose Or Replace Your Phone

References