Skip to content
Logo Ceptro.br Logo NIC.br Logo CGI.br

Two-factor authentication


Description

Two-factor authentication is the use of at least two distinct factors to confirm the identity of the user accessing a particular account.

Factors can be divided into three categories:

- Something you know: like a password or a PIN code;
- Something you own: like a password generator token or a verification code sent to your mobile phone;
 -Physical and behavioral specifics: such as biometric information (fingerprint, palm, voice, or eye) or biometric typing.

To use two-step verification and protection, it is important to use factors from distinct categories to really increase security and make sure your account is protected and safe from third-party invasion.

Here are some examples of two-factor authentication software and devices: Authy, Google Authenticator, and YubiKey. 

This list should not be understood as recommendations, but as examples to illustrate the type of software programs or devices referenced in this video and explanatory text. Before choosing one of these options or any others, carefully read the description and license, check the company's reputation, and look at the reviews of other users. Be very careful to download it from a trusted repository, if it is a software program, and test it until you feel comfortable actually using it on a day-to-day basis.

For more information:
https://cartilha.cert.br/fasciculos/#autenticacao (portuguese only)

 

Accessibility:

The first scene shows a laptop with a login screen showing a password being typed in and a hacker coming out behind it. In this scene, the following phrase appears: “A strong password is only the beginning."

In the second scene, a laptop screen appears with the phrase "Enter token," and the hacker gets frightened and leaves. In this scene, the following phrase appears: "Two-step authentication protects your accounts even more." 

The third scene shows how to use two-factor authentication with apps, tokens, QR codes and SMS. In this scene, the following phrase appears: "This can include.” 

The fourth scene shows a mobile phone that has received a token code to be entered on the laptop. After entering the token, "Login successful" appears on the laptop screen. In this scene, the following phrase appears: "Enable two-factor authentication on all your accounts."

Security Postado em 11/19/21

LICENÇACC BY-ND


Interested in participating in the initiative?

Companies and organizations interested in participating can become partners in this initiative, adding their logo to a customized version of the videos, which can be published on their website or on other channels. Send us an e-mail parceriacidadaonarede@nic.br to request the application of your company or entity's logo to our videos.