Introducing Two-Factor Authentication

 

What is it?
Two-factor authentication adds an additional layer of security by introducing a second step to your login. It takes something you know (i.e.: your password), and adds a second factor, typically something you physically have (such as your phone). Since both are required to log in, in the event an attacker obtains your password two-factor authentication would stop them from accessing your account.

Why do I need it?
Passwords are increasingly easy to compromise. They can often be guessed or leaked, they usually don’t change very often, and despite advice otherwise, many of us have favourite passwords that we use for more than one thing. So Two-factor authentication gives you additional security because your password alone no longer allows access to your account.

How does it work?
Time Based One-Time passwords requires downloading an OATH application onto your smartphone or tablet, and optionally a bar-code reader. Once activated a pop-up screen will present a QR code, with optional manual code to enter into your smartphone or tablet.

Once scanned or entered, a time based one time password will appear within your OATH application providing the second form of verification used to log in.

Additionally, a backup code is presented which should be stored in the event that your smartphone or tablet is not accessible and you wish to gain access into BIP account.

Which app do I need for Two-Factor Authentication?
Our Two-Factor Authentication uses a system called 'Time Based Tokens'. There are many compatible apps you can find in your device's store. We suggest the following:

  • two factor, Authenticator, OATH, authentication
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

How To Choose A BIP Data Center

Deploying your BIP server to a geographically advantageous data center can make a big...

Getting Started with BIP

  Welcome To BIP!   Thank you for choosing BIP as your cloud hosting provider! This guide...

Generate SSH Keys on Windows with PuTTYgen

Secure Shell (SSH) is a cryptographic network protocol used for a secure connection between a...

Using SSH on Windows

OpenSSH As of late 2018, OpenSSH is included with some versions of Windows. Cygwin Cygwin is...

Which app do I need for Two-Factor Authentication?

  Our Two-Factor Authentication uses a system called 'Time Based Tokens'. There are many...