Help Center
DocsTwo-Factor Authentication
Add an authenticator app, register passkeys, and generate backup codes
Overview
Three independent second factors, each configured on Settings > Security.
Two-factor authentication (2FA / MFA) means you need something in addition to your password to sign in. The Security page supports three kinds of second factor: time-based codes from an authenticator app, passkeys bound to a device, and single-use backup codes. You can enroll more than one of each — a common setup is a phone authenticator plus a laptop passkey plus a sheet of backup codes printed out.
Authenticator App (TOTP)
Time-based one-time passwords from apps like Authy, 1Password, or Google Authenticator.
Open the authenticator card
Scan the QR code
Enter the 6-digit code
Name it and save
Verified authenticators appear in a list on the card with their friendly name and the date added. You can enroll multiple authenticators — for example, one per device.
Passkeys
A modern replacement for passwords bound to your device's biometrics or a security key.
A passkey is a credential stored securely on your device. Signing in checks that you are physically present (Face ID, Touch ID, Windows Hello, or a tap on a hardware security key) rather than asking you to type anything. Passkeys cannot be phished because they are tied to the exact site that created them.
Device compatibility (once enrollment ships)
- Platform authenticators — Face ID and Touch ID on Apple devices, Windows Hello on Windows 10+, fingerprint or face unlock on Android. The passkey stays on that device (or syncs via iCloud Keychain / Google Password Manager).
- Cross-platform authenticators — Hardware keys like YubiKey or SoloKey. Portable across machines, good for shared or hot-desk setups.
Removing a Passkey
Existing passkeys can be removed today even though new enrollment is not yet available.
- Find the passkey in the list on the Passkeys card and click the trash icon.
- Re-verify with step-up reauth in the dialog.
- Confirm removal. The passkey is removed immediately.
Backup Codes
Single-use codes that save you when you cannot reach your other factors.
Backup codes are the emergency method. Each sheet contains 10 single-use codes — any one of them works as a second factor exactly once. The Codes remaining counter on the card tells you how many are left.
How they work
- You must have at least one verified authenticator or passkey before you can generate codes. Backup codes only protect MFA — they are a fallback, not a standalone factor.
- Click Generate codes (or Regenerate if you already have codes). The step-up reauth dialog asks you to verify first, because generating a new sheet invalidates the old sheet.
- The 10 codes are shown once, in a modal. Copy, download, or print them before you close the modal — there is no way to view them again.
- Each code can be used exactly once. Using one decrements the Codes remaining counter.
- When you run low, regenerate to get a fresh sheet. The old sheet is invalidated the moment the new one is created.
Step-Up Reauth
Changing MFA factors requires fresh verification.
Adding an authenticator, adding a passkey, removing either, or generating backup codes all require a step-up reauth first. When you click the relevant button, a modal asks you to prove it is you using a factor you already have (your password, an existing authenticator, or a passkey). Once you verify, you have a short window where further security changes do not re-prompt.
Removing a Factor
Quick steps and the guardrail that keeps you signed in.
- Click the trash icon next to the authenticator or passkey you want to remove.
- Re-verify with step-up reauth.
- Confirm in the dialog.
- The factor is removed immediately; other verified factors remain in place.
Multiple Factors Are Allowed
Stack them for convenience and resilience.
You can enroll as many authenticators and as many passkeys as you like — there is no cap. A common setup is one authenticator on your phone, one passkey on each of the laptops you use, and a single sheet of backup codes in your password manager. At sign-in time, any of them can satisfy the MFA challenge.