Using Security Key for 2-Step Verification

If you use 2-Step Verification, you can choose Security Key as your primary method, instead of having verification codes sent to your phone. With Security Key, there’s no looking at codes and re-typing―you simply insert your Security Key into your computer’s USB port when asked.

Is Security Key right for me?

Security Key is right for you if you want protection even beyond what using verification codes sent to your phone already gives you. Advantages include:

  • Better protection against phishing. With 2-Step Verification, Google requires something you know (your password) and something you have (like your phone) to sign in. Google sends a verification code to your phone when you try to sign in to confirm it's you. However, sophisticated attackers could set up lookalike sites that ask you to provide your verification codes to them, instead of Google. Security Key offers better protection against this kind of attack, because it uses cryptography instead of verification codes and automatically works only with the website it's supposed to work with.
  • No mobile connection or batteries needed. Security Key works without a data connection, and you can carry it wherever you go on a keychain or in your wallet.
Here are a couple of cases where you will want to use verification codes instead of a Security Key:
  • You use your account only on a mobile device. Security Key requires a USB port to work, so it’s not recommended for mobile-only users.
  • You don’t use Chrome. Security Key does not work on browsers other than Chrome.

 

Requirements for using Security Key

To use Security Key, you’ll need a computer running Google Chrome version 40 or newer on ChromeOS, Windows, Mac OS, or Linux.

In general, you’ll still be able to use a verification code the way you normally do on any device that doesn’t support Security Key.

How do I get a Security Key?

You can use any device compliant with the open standard called “FIDO Universal 2nd Factor (U2F)”.

You can find FIDO U2F Security Key devices for sale using the links below (choose the nearest country for shipping):

 

hc_author_ashley

Ashley is an Accounts expert and the author of this help page. Leave her feedback below about how to improve it.

Was this article helpful?