Two variable authentication (2FA) improves accounts security by requiring an additional method of corroboration when users log in. Instead of just relying upon the user’s password, it takes a piece of equipment like an authenticator app or YubiKey to verify the user’s identity. This ensures that only the actual owner belonging to the device can log in, click to investigate even if their very own credentials happen to be compromised.
Currently, 2FA is required for editors with advanced permissions and admins of all projects which is optional for some other types of users (see the section underneath on how to permit it). However , any publisher can improve their account security by enabling two variable authentication for Wikipedia accounts. This is especially advised for managers and publishers with advanced permissions, especially in light of a couple of high-profile hacking incidents which have led to criminal behaviour of the encyclopedia.
To enable 2FA, click your name in the rightmost top corner corner of your personal site to go to your account settings after which select the Multi-Factor Authentication preferences. Consequently, click Enable. Alternatively, an administrator when using the Users and Permissions | Manage Two-Factor Authentication Tasks base permission can use a similar page to indicate that any kind of role that will need 2FA requires the user to create 2FA after their primary login. This setting as well enables managers to designate how often the role will probably be presented with the 2FA concern, which works in conjunction with the time of day at the user’s dependable device (see Help: Two-Factor Authentication). Users who like to receive their particular verification codes via TEXT must make certain their smartphone is enabled for txt messaging and they have an authenticator app attached to it.