{"id":44637,"date":"2020-04-19T09:00:39","date_gmt":"2020-04-19T15:00:39","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=44637"},"modified":"2022-09-13T12:40:34","modified_gmt":"2022-09-13T16:40:34","slug":"totp-2fa-pros-cons","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/totp-2fa-pros-cons","title":{"rendered":"TOTP Two-Factor Authentication (2FA) – Pros and Cons"},"content":{"rendered":"\n
Two-factor authentication (2FA) \u2013\u2013 otherwise called multi-factor authentication (MFA) \u2013\u2013 is one of the best precautions against cyberattacks an organization can adopt. MFA requires two or more factors to authenticate users to IT resources, usually \u201csomething they know\u201d (their credentials) in combination with \u201csomething they have.\u201d The latter can be anything from a numeric code sent to their phones via SMS to their fingerprint.<\/p>\n\n\n\n
Admins often employ time-based, one-time passwords (TOTP)<\/a> as the second factor. TOTP tokens are randomized, numeric codes generated by an app that automatically refreshes. TOTP 2FA offers many security benefits, but there are also a few drawbacks to consider. Check out the following pros and cons to find out if TOTP 2FA is right for you.<\/p>\n\n\n\n In order for users to access their assets, their credentials must match what their organization has on file, and their TOTP code needs to match what the application or system has on their server. If the TOTP code doesn\u2019t match, then the user will be denied entry.<\/p>\n\n\n\n TOTP 2FA may not be right for everyone. Organizations that deal with exceptionally sensitive assets may benefit from other types of 2FA, such as USB keys. But, for organizations with limited resources that still want to secure their identities and IT resources, TOTP may be their ideal choice.<\/p>\n\n\n\nOverview of TOTP 2FA<\/h2>\n\n\n\n
Pros:<\/h3>\n\n\n\n
Cons:<\/h3>\n\n\n\n
Is TOTP 2FA Right For You?<\/h2>\n\n\n\n