The pros and cons of authentication apps (2024)

Ken Colburn| Special to The Republic

Q: What are the pros and cons of using a third-party authentication app?

A: Every user of the Internet should be familiar with the security concept known as ‘2-factor authentication’ (2FA) which typically uses your smartphone to verify that you are the owner of an account while logging in via a special one-time code.

It’s the best thing you can use to help protect against the many threats of having your accounts compromised, even if you fall for a sophisticated phishing scam.

Most every account you have has the option to set up 2FA, so if you haven’t done so, I’d highly recommend you do it immediately.

Third-party authentication apps

An alternative to setting up the text messaging-based authentication that most companies like Facebook and Twitter use, is by installing an app that provides the authentication codes.

This outside option for securing your accounts has many pros and cons, so depending upon the services you want to protect and your comfort with learning new apps, this may or may not be your best option.

How to send messages on iPhone with effects

Spruce up your text messages with these special effects.

ProblemSolved, USA TODAY

Pros of using an app

One of the downsides to using the standard text-messaging process to receive your verification codes is that if you don’t have a cell signal, you might not get your code delivered to your smartphone.

A common example of this is if you’re on a long flight using the airplane’s Wi-Fi service. You have Internet access, but you won’t have cell service which is how your verification code may be sent.

Third-party authentication apps generate the code on your smartphone, so they can still work if your smartphone can’t get a cell signal.

An authentication app will also protect against a technique hackers use to compromise text-based 2FA codes by using SIMjacking.

Are online password managers safe?Here's the most secure way to store passwords

They pose as you with your mobile carrier and convince them to transfer your number to a new SIM as if you had just purchased a new phone so they can get your texted codes.

In many cases, the encryption protocols used by authentication apps are also much stronger than text messaging codes.

Compatibility with most major services also allows you to secure all your accounts with one app.

Cons of using an app

As with any technology, there can be challenges if you decide to switch to an authentication app since your ability to access your accounts is now tied to a specific device.

If you use an app on your smartphone for authentication and the battery goes dead or the device breaks or gets stolen, you could get locked out of your accounts.

Ensuring that you have the app set up on multiple devices like a smartphone and a tablet can help reduce your risk of being locked out.

Personal protection:How to hide your personal information from data brokers

Some non-technical users may find using the app to be too complex or confusing to set up and use, which is why I recommend that you always test the app with a single non-essential account before you decide to convert all your accounts.

Some online accounts, especially financial services, may not be compatible with a third-party authentication app, so you’ll have to spend time learning what will and won’t work.

Ken Colburn is founder and CEO of Data Doctors Computer Services,datadoctors.com. Ask any tech question atfacebook.com/DataDoctorsor on Twitter@TheDataDoc.

The pros and cons of authentication apps (2024)

FAQs

The pros and cons of authentication apps? ›

Since the verification codes are generated within the app and not sent via text message, attackers cannot easily intercept them. However, there are some drawbacks to using authenticator apps. One of the main concerns is the risk of losing access to accounts if a user loses their device or accidentally deletes the app.

What are the advantages and disadvantages of authentication? ›

User authentication provides strong security and granular control over who can access sensitive data or perform specific actions. However, it can be time-consuming for users and requires additional infrastructure and management.

What are the benefits of authenticator apps? ›

An authenticator app is a mobile application that provides an extra layer of security to your online accounts by generating time-based one-time passwords (TOTPs). These passwords are used for two-factor authentication (2FA) and help protect your accounts from unauthorized access.

Are authenticator apps any good? ›

We Recommend: Microsoft is a great option for storing verification codes for work, school, and personal accounts. We would also highly recommend all Microsoft 365 user enforce MFA using Microsoft's authenticator app. Authy is a desktop and mobile app for two-step verification for any online accounts.

Is it safe to use the authenticator app? ›

You should use an authenticator app over SMS authentication because it is more secure and less likely to be intercepted by cybercriminals. Authenticator apps generate 2FA codes locally on a device, rather than sending them unencrypted over text message.

What are the disadvantages of authorization? ›

Cons of Authorization Only Transactions

There are also numerous downsides to authorization only transactions, most of which occur on the consumer side. The biggest disadvantage of authorization only transactions is that they hold funds from the customer's account.

Do authenticator apps track your phone? ›

The Microsoft Authenticator app can be used to authenticate to many resources including personal accounts (such as your bank), work or school accounts, and other accounts (such as LinkedIn). Does the Microsoft Authenticator track me? The Microsoft authenticator does not track you and it does not log location data.

Why would someone use an authenticator app? ›

The primary reason for using an authenticator app is to keep your accounts secure. With so much malware created, phishing scams perpetrated, and hackers getting even smarter, using strong passwords may not be enough.

Does authenticator app collect data? ›

Authenticator collects your GPS information to determine what country you are located in.

Which authenticator app is the best to use? ›

  • Google Authenticator: Best for secure offline authentication. ...
  • Microsoft Authenticator: Best for biometric authentication. ...
  • Twilio Authy: Best for cross-platform compatibility. ...
  • Cisco Duo: Best for robust security features. ...
  • Yubico Authenticator: Best for hardware-based authentication.
Mar 26, 2024

Is a security key better than an authenticator app? ›

Compared with other forms of authentication, security keys have some major advantages. An authentication app generates a code on your phone, and it is easy enough to enter. But security keys save you the hassle of finding your phone, copying the code, and pasting it before the timer runs out.

Do I have to pay for the authenticator app? ›

Microsoft Authenticator is a free app that helps you sign in to all your accounts without using a password - just use a fingerprint, face recognition, or a PIN. You can use Authenticator to sign in to your Microsoft personal, work, school or other accounts.

What are the disadvantages of authenticator apps? ›

Since the verification codes are generated within the app and not sent via text message, attackers cannot easily intercept them. However, there are some drawbacks to using authenticator apps. One of the main concerns is the risk of losing access to accounts if a user loses their device or accidentally deletes the app.

Can an authenticator be hacked? ›

Since the code is valid for just 30 seconds, hackers don't have much time to use it. It's impossible to recover a secret key from a one-time code, so even if the code is intercepted, attackers won't be able to clone the authenticator. No internet connection is required on the device generating one-time codes.

Do not want Microsoft Authenticator app? ›

3 answers
  • Sign in to the Azure portal as a global administrator or security administrator.
  • Go to Azure Active Directory > Security > MFA.
  • Under MFA settings, select Additional cloud-based MFA settings.
  • Under service settings, select Microsoft Authenticator app.
  • Change the setting to Disabled.
Mar 20, 2024

What are the disadvantages of basic authentication? ›

Problems with Basic Authentication
  • The username and password are sent in every request. ...
  • Most configurations of Basic Authentication do not implement protection against password brute forcing. ...
  • Logout functionality is not supported. ...
  • Passwords cannot be easily reset.

What are the disadvantages of verification? ›

Verification disadvantages

The verification process can be lengthy and even delay product releases — especially if faults are found.

What are the pros and cons of using two factor authentication? ›

The Pros And Cons of Two-Factor Authentication
Pros and Cons of 2FA
ProsCons
Flexibility: IT leads can choose which second factors to deploy.Resistance to change: If users are unfamiliar with 2FA, it could feel intrusive.
3 more rows
Aug 1, 2023

What are the advantages and disadvantages of biometric authentication? ›

What are the advantages of the biometric system? The advantages of biometric systems are faster authentication, accuracy, scalability etc. What are the disadvantages of the biometric system? The disadvantages of biometric systems are False positives, cost, privacy issues etc.

Top Articles
Cost of living in Germany compared to other countries
Using VPN and Tor: Benefits, risks, and impact on fingerprinting
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6392

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.