Implement 2-factor authentication for Gmail and Google accounts

By: ( +David Herron; Date: January 2, 2018

Tags: Internet Privacy

Your email account is the skeleton-key to your life, since all kinds of services send emails to verify this and that. Protecting your email account(s) is, then, vital to securing your online life. Since Google's gmail is perhaps the most popular email platform, we'll look at an effective way to secure your gmail account(s). Namely, 2-factor authentication means logging in requires access to not just your password, but to a second device - such as your cell phone.

Google has fairly comprehensive support for 2-factor authentication. Simply go here: (

That's the portion of your Google Account page concerning the sign-in process. Another way to find this page is to start while logged-in to a Google service like Gmail, or YouTube, and to click on the avatar icon in the upper right corner of the window. This is the menu which allows switching between logged-in accounts, AND it gives easy access to your Google Account home page.

Namely: ( That page includes a box labeled "Sign-in and Security" which leads to the page linked above.

On ( you'll find a box labeled "2-Step Verification". If you've not turned it on, the word "Off" will appear. In any case, click on that box.

You'll end up here: (

As the URL implies, this is the page to enable the 2-step login verification process.

By the way, folks with GSuite accounts are unable to use the 2-step login verification process. I have several GSuite accounts, including my primary e-mail address. I've just checked with two of them, and neither offer 2-step login verification as an option. But every one of my Google Accounts for the " (" domain do offer 2-step login verification.

You may first see this picture -- if so, click on the Get Started button
On this screen you start the process of registering your phone with Google for 2-factor sign-in
On this screen, you've verified the phone, and can proceed with setting up 2-factor sign-in

At this point the default is that Google will send you a text message every time you sign-in to a Google account. The improvement is that a miscreant has to have your cell phone in order to log-in to your account. It's not enough to figure out your password, but they must also steal your cell phone.

That of course makes your cell phone a critical device you must protect at all costs - and a single point of failure which could block access to your accounts. But --- Google offers some alternate methods for authenticating that decreases the criticalness of your cell phone.

An issue which weighs heavily on me is that I sometimes travel to other countries. While there, I try to not use my US cell phone number because AT&T charges through the nose for foreign usage. And remember that Canada is a foreign country (to the USA) and you'll pay through the nose for the privelege of using your AT&T cell phone in Canada.

If I'm staying in the country for a long enough period, I'll get a local SIM card and pop that into my cell phone. With a foreign SIM card in my phone, I no longer have access to my USA phone number because it's assigned to the AT&T SIM card. That, in turn, means that those accounts which send a text message for 2-factor authentication are now a liability -- because if my cell phone isn't answering for that phone number, I'll never receive the text message, and I won't be able to log-in to the account.

Let's go over the alternative authentication methods offered by Google

Backup Codes Google provides you with a list of code numbers you can print out and carry with you. Each are a one-time passcode. I suggest turning this off until you need to make an overseas trip.

Google Prompt This is an application installed on the cell phone to which you can tap Yes to authenticate yourself. I started to set this up, but the application claimed it needed to track my web browsing and other activity, so I declined this one.

Authenticator App This is another application installed on the cell phone. You register your phone with the Google account by scanning a QR code. Anytime you're requested to authenticate with Authenticator, you run the app, and it shows a constantly updated code number. Simply enter the code number into the sign-in form, and you're authenticated. I am using this method.

The only downside to the Authenticator app is if you have multiple services using it. The Authenticator app is open enough that any company can utilize it - for example I have two AWS account entries in my Authenticator app. Plus, I have several Google Accounts, and each one is a separate Authenticator entry. Bottom line is that it'll be easy to have enough services registered with the Authenticator app to complicate its use.

Each service listed in Authenticator generates a separate Authenticator code. Therefore you could easily have a dozen such services, or more, and therefore have a dozen or more Authenticator codes. You have to be careful to select the correct code for the service you're authenticating with.

Backup phone This would be a second phone number that can be used. For example, once you arrive in the foreign country and get the local SIM card, enter its phone number here.

Security Key A physical device that offers security codes. I don't have one for Google, but have used such things for authentication with workplace internal networks, and it's fairly easy to use so long as you remember to carry that security key dongle at all times.

« Russia, Venezuela, eying Blockchain technology to evade economic sanctions Smith was 13, Capaldi 14, Whittaker 15, how many regenerations does The Doctor have remaining? »
2016 Election 2018 Elections Acer C720 Ad block Air Filters Air Quality Air Quality Monitoring AkashaCMS Amazon Amazon Kindle Amazon Web Services America Amiga and Jon Pertwee Android Anti-Fascism AntiVirus Software Apple Apple Hardware History Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Artificial Intelligence Astronomy Astrophotography Asynchronous Programming Authoritarianism Automated Social Posting AWS DynamoDB AWS Lambda Ayo.JS Bells Law Big Brother Big Data Big Finish Big Science Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnets Cassette Tapes Cellphones China China Manufacturing Christopher Eccleston Chrome Chrome Apps Chromebook Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Climate Change Clinton Cluster Computing Command Line Tools Comment Systems Computer Accessories Computer Hardware Computer Repair Computers Conservatives Cross Compilation Crouton Cryptocurrency Curiosity Rover Currencies Cyber Security Cybermen Cybersecurity Daleks Darth Vader Data backup Data Formats Data Storage Database Database Backup Databases David Tenant DDoS Botnet Department of Defense Department of Justice Detect Adblocker Developers Editors Digital Nomad Digital Photography Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Doctor Who Review Drobo Drupal Drupal Themes DVD E-Books E-Readers Early Computers eGPU Election Hacks Electric Bicycles Electric Vehicles Electron Eliminating Jobs for Human Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Face Recognition Facebook Fake News Fedora VirtualBox Fifth Doctor File transfer without iTunes FireFly Flash Flickr Fraud Freedom of Speech Front-end Development G Suite Gallifrey Gig Economy git Github GitKraken Gitlab GMAIL Google Google Chrome Google Gnome Google+ Government Spying Great Britain Green Transportation Hate Speech Heat Loss Hibernate High Technology Hoax Science Home Automation HTTP Security HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS iOS Devices iPad iPhone iPhone hacking Iron Man iShowU Audio Capture iTunes Janet Fielding Java JavaFX JavaScript JavaScript Injection JDBC John Simms Journalism Joyent Kaspersky Labs Kext Kindle Kindle Marketplace Large Hadron Collider Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac Mini Mac OS Mac OS X MacBook Pro Machine Learning Machine Readable ID Macintosh macOS macOS High Sierra macOS Kext MacOS X setup Make Money Online Make Money with Gigs March For Our Lives MariaDB Mars Mass Violence Matt Lucas MEADS Anti-Missile Mercurial MERN Stack Michele Gomez Micro Apartments Microsoft Military AI Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications Mobile Computers MODBUS Mondas Monetary System MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Network Attached Storage Node Web Development Node.js Node.js Database Node.js Performance Node.js Testing Node.JS Web Development Node.x North Korea npm NVIDIA NY Times Online advertising Online Community Online Fraud Online Journalism Online Photography Online Video Open Media Vault Open Source Open Source and Patents Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenJDK OpenVPN Palmtop PDA Patrick Troughton PayPal Paywalls Personal Flight Peter Capaldi Peter Davison Phishing Photography PHP Plex Plex Media Server Political Protest Politics Postal Service Power Control President Trump Privacy Private E-mail server Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero ReactJS Recaptcha Recycling Refurbished Computers Remote Desktop Removable Storage Republicans Retro Computing Retro-Technology Reviews RFID Rich Internet Applications Right to Repair River Song Robotics Robots Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking Rust SCADA Scheme Science Fiction SD Cards Search Engine Ranking Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Serverless Framework Servers Shell Scripts Silence Simsimi Skype SmugMug Social Media Social Media Networks Social Media Warfare Social Network Management Social Networks Software Development Software Patents Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot Spy Satellites SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Stand For Truth Strange Parts Swagger Synchronizing Files Tegan Jovanka Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Tom Baker Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Twitter Ubuntu Udemy UDOO US Department of Defense Video editing Virtual Private Networks VirtualBox VLC VNC VOIP Vue.js Walmart Weapons Systems Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Webpack Website Advertising Weeping Angels WhatsApp William Hartnell Window Insulation Windows Windows Alternatives Wordpress World Wide Web Yahoo YouTube YouTube Monetization