modopk.blogg.se

Winauth
Winauth







Last but not least, if you own a Yubikey device, you may use it for protection as well. You may protect the data using a custom password, or may use Windows account encryption to protect it so that it cannot be used on another computer, or even another user on the computer.

winauth

The program displays protection options once the syncing completes. You can then hit the verification button in WinAuth to generate a verification code that you entert on the service's website to complete the sync process. Since it does not support the scanning of QR codes, it is a required step to make the program the code generator for the selected account. Generally speaking, you will get an email or SMS first to verify the setup, and need to copy a secret key that is displayed on the site into the WinAuth application. What you need to do usually is open the service on the web to start the 2-factor authentication setup. How that is done depends on the service in question. The process is usually the same regardless of service, but it is only explained in detail for the listed services and not the generic option. WinAuth supports any service that uses Google Authenticator, Microsoft Authenticator, or RFC 6284 based authentication. The program supports - at the time of writing - Google, Microsoft, and the gaming services or games, Steam, Guild Wars 2, Glyph, SWTOR, RuneScape, and WildStar.

winauth

WinAuth has been designed as a free program for Windows to give Windows users a tool at hand that they can use to generate codes for several popular services.

  • Remote Generation: requires a mobile phone, with codes arriving via SMS.
  • Google Authenticator and Authy are two popular solutions, but there are more, and some companies have created their own authenticator application.
  • Software-based: usually as an application that you install on a smartphone.
  • Once synced, you press a button to generate a code.

    winauth

  • Hardware-based: usually come in form of a simple gadget that you sync with an account.
  • There are three core types of code generations for 2-factor authentication schemes: hardware-based, software-based, and remote-generation.









    Winauth