{"id":44637,"date":"2020-04-19T09:00:39","date_gmt":"2020-04-19T15:00:39","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=44637"},"modified":"2022-09-13T12:40:34","modified_gmt":"2022-09-13T16:40:34","slug":"totp-2fa-pros-cons","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/totp-2fa-pros-cons","title":{"rendered":"TOTP Two-Factor Authentication (2FA) – Pros and Cons"},"content":{"rendered":"\n

Two-factor authentication (2FA) \u2013\u2013 otherwise called multi-factor authentication (MFA) \u2013\u2013 is one of the best precautions against cyberattacks an organization can adopt. MFA requires two or more factors to authenticate users to IT resources, usually \u201csomething they know\u201d (their credentials) in combination with \u201csomething they have.\u201d The latter can be anything from a numeric code sent to their phones via SMS to their fingerprint.<\/p>\n\n\n\n

Admins often employ time-based, one-time passwords (TOTP)<\/a> as the second factor. TOTP tokens are randomized, numeric codes generated by an app that automatically refreshes. TOTP 2FA offers many security benefits, but there are also a few drawbacks to consider. Check out the following pros and cons to find out if TOTP 2FA is right for you.<\/p>\n\n\n\n

Overview of TOTP 2FA<\/h2>\n\n\n\n

In order for users to access their assets, their credentials must match what their organization has on file, and their TOTP code needs to match what the application or system has on their server. If the TOTP code doesn\u2019t match, then the user will be denied entry.<\/p>\n\n\n\n

Pros:<\/h3>\n\n\n\n