How do I know if I set up Apple's two factor authentication?

How can I tell if I ever set up Apple's two factor authentication and should make sure I can find the Recovery Key?

Hi David,
You can check to see whether you turned on two-step verification for your Apple ID by seeing if it will allow you to turn it off. Follow the instructions in this article, though you do not actually have to turn it off -
Apple ID: Turning off two-step verification for your Apple ID - Apple Support
Read this article for more information on two-step verification, including the Recovery Key -
Frequently asked questions about two-step verification for Apple ID - Apple Support
Thanks for using Apple Support Communities.
Best,
Brett L 

Similar Messages

  • How do i know if my set top box is compatible to voice command

    How do i know if my set top box is compatible for voice command and were do i find the set top box ID.

    Any of the X1 DVRs( box ID is on the front) and the Xi3 ( PX0032ANI found on the bottom). RNG150's ( ID found on the front) do not have voice command remote compatibility

  • How do I know whitch DVD set to purchases if I want to upgrade my iBook g4  Mac OS X 10.3.9 to

    How do I know whitch DVD set to purchases if I want to upgrade my iBook g4  Mac OS X 10.3.9 to
    Mac OS X 10.4

    You need a retail DVD and not one which originally shipped with a Mac.
    (86917)

  • I am trying to set up two-factor authentication but none of my devices appear listed.

    I am trying to set up two-factor authentication but none of my devices appear listed. I am only given an option to add an SMS-enabled device. When I do this, I receive an SMS with a code, but have no way to continue in the browser. I have enabled find my iPhone on at least one device, and can see all my devices in the find-my-iPhone app. Am I missing something?

    As a check, this page walks you through the process:
    http://technofyi.com/2013/03/21/how-to-enable-apples-two-step-verification-featu re/
    His step 6 shows the 'Step 1 of 4' page where you should click 'Add an SMS-capable phone number'.
    His step 7 shows the 'Add a phone number' window where you can enter the phone number and click 'Next'. The phone should then receive the code by SMS.
    His step 8 shows the 'Verify Device' window which should appear automatically in which you can enter the code.
    Are you not seeing the window in step 8? if this is not popping up automatically then something is going wrong: you could try clearing your browser's cache and trying again. If it still won't work you may have to contact Support: Go to https://getsupport.apple.com ; click 'See all products and services', then ' 'iTunes', and then 'iTunes Store', then 'Account Management' then 'Apple ID account security' - this seems to be the nearest relevant option.

  • Two Factor Authentication How to Preserve Cookies?

    So, I am starting to set up Two Factor Authentication for various logins that I have. As a normal practice, whenever I close any browser I delete all cookies, and when shutting down my computer I do a Norton scan for cookies and delete them. The problem is that this deletes my two factor authentication cookies which I need. I tried setting up an exception, but the cookies get deleted anyway. How do I set this up to work, ie protect specific cookies from deletion?
    In Internet Explorer this is extremely easy to do. All you do is put a checkmark next to "Preserve Favorites Website Data".....Done. The equivalent in Firefox you would think is "Site Preferences", but that does not work the same as in IE and the cookies are deleted.

    Let all cookies expire when Firefox is closed to make them session cookies.
    *Firefox/Tools > Options > Privacy > "Use custom settings for history" > Cookies: Keep until: "I close Firefox"
    Create a cookie 'allow' exception for cookies that you would like to keep.
    *Firefox/Tools > Options > Privacy > "Use custom settings for history" > Cookies: Exceptions
    Note that clearing "Site Preferences" clears all exceptions for cookies, images, pop-up windows, software installation, passwords, and other website specific data.
    Clearing cookies will remove all specified (selected) cookies including cookies with an allow exception that you would like to keep.
    See also:
    *http://kb.mozillazine.org/browser.sessionstore.privacy_level

  • How to deploy connection (Mac OS X Yosemite to Windows RDS) through the RD Gateway with Two Factor authentication (Safenet OTP) on Session host?

    Good day!
    Could you please help me? How to deploy connection (Mac OS X Yosemite to Windows RDS) through the RD Gateway with Two Factor authentication on Session host? How to open an authentication dialog that is the same as in Windows when logging on to network resources
    in Windows (Windows Security)?
    Our test environment: We have one RDS 2012 R2 server (all roles in one) and one session host in collection. On the session host installed Safenet Network Logon and it under GPO which disable all authentication, only OTP.

    Hi Sir,
    It seems that you are going to integrate 3rd party product into AD for authentication .
    I would suggest you to contact the vendor of Safenet for this deployment  scenario  :
    http://www.safenet-inc.com/multi-factor-authentication/authentication-management/safenet-authentication-manager-express-samx/
    Best Regards,
    Elton Ji
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected] .

  • Two factor authentication. How secure will be this setup?

    I want to be able to have a passphrase + keyfile (on a usb stick) combination. So whoever is going to unlock the system has to HAVE something AND KNOW something to get access. Of course, this way, if the stick is lost, then the disk can't be decrypted. That's why there has to be a back-up usb stick. But if you merely duplicate the same key stored on stick (1) to stick (2), then whoever finds/steals stick (1) now knows your current keyfile. I want to make it so that loosing a usb stick will not weaken the security in any way, by making so that the keyfile stored on that usb stick can be easily made useless. So my plan is to do the following:
    HDD
        partition 1 | Contains encrypted keyfiles `Ke1`, `Ke2`
        partition 2 | Luks device, encrypted using the key `Ka`
    Usb Stick 1
        boot
        keyfile K1
    Usb Stick 2 (backup)
        boot
        keyfile K2
    where
    passphrase is `P`
    `Ke1`          is  `Ka` encrypted using K1 and P
    `Ke2`          is  `Ka` encrypted using K2 and P
    K1 and K2 are different. Both are randomly generated keyfiles.
    During the boot the following happens:
    1) It boots from the usb stick (1)
    2) It asks for a passphrase `P` in initrd. User types the passhprase.
    3) It read keyfile `K1` from the USB stick (1)
    3) It decrypts `Ke1` (which is encrypted using AES-256). It first decrypts it using `P`, then it decrypts it using K1. In the end you get the original `Ka`.
    4) It uses `Ka` to unlock the luks device on partition 2 and then runs the system from there. Of course, Ka is only in memory.
    If stick (1) is lost:
    Then you can nuke (e.g. using shred) `Ke1` and now the K1 which is on that stick (1) is useless. But you can now use stick (2) instead since there is another version of encrypted `Ka` stored (`Ke2`).
    If HDD is lost:
    Although the keyfile (`Ka`) that decrypts the luks partition is stored on the drive itself, nobody can use that keyfile, because it's encrypted. I.e. they will only find `Ke1` and `Ke2` there, which will be useless without a usb stick and a passphrase.
    Basic evil maid attacks (like infecting the MBR, which is what e.g. FinFisher does) should be impossible with this, because it boots from a flash that you carry with yourself.
    Any comments?
    P.S.
    The real system will look like this:
    HDD
        partition 1 | encrypted keyfiles
        partition 2 | luks device with LVM
            LVM swap
            LVM cryptdevice
                btrfs
                       /current-homeroot
                           /home
                           /root
                       /snapshot1
                           /home
                           /root
                       /snapshopt2 and etc
    USB Stick
        /boot
        Keyfile 1
    Then one can do incremental snapshots of the system.

    I use the Google Authenticator app on my phone as two-factor authentication when SSH'ing to my VPS.
    https://wiki.archlinux.org/index.php/Go … henticator
    You get emergency codes to write down so you don't need a backup device.
    I've not looked into whether or not you can use it to unlock a LUKS setup, but it's a PAM module so it might not be that difficult. It's worth searching for as an alternative to USB sticks.
    Last edited by slithery (2015-01-10 20:21:13)

  • How do i know if its set on disk mode?

    how do i know if my ipod is on disk mode?
    can i see it on my ipod?
    itunes wont open when i plug the ipod in th computer and if i have itunes open and then plug in the ipod it just frezes (itunes) and i clikc ctrlaltdelete and it says 'no answer' (or whatever it says in english).
    and when i try to get on the ipod through 'my computer' it also says 'no answer' after freezing and then me pressing ctrl alt delete

    There really is no sure way to tell.  Your best bet would be to send it into a 3rd party repair company who offers free diagnostics to help you determine the cause of issue or bring it to your local Apple store and see what they have to say.
    B-rock

  • How do I know if the email from Apple asking for credit card information is genuine

    Hi, I just received an email from Apple Worldwide telling me they've suspended my account momentarily until they can certify my details which includes wanting credit card info etc.  how do I know it's genuine?

    Hello pegglekatie,
    This e-mail is not from Apple.
    The iTunes Store will never ask you to provide personal information or sensitive account information (such as passwords or credit card numbers) via email.
    Identifying legitimate emails from the iTunes Store
    http://support.apple.com/kb/HT2075
    The article linked below details a number of steps that can help identify where this email has originated, and can help determine if other messages that appear to be from Apple are legitimately from Apple.
    Identifying fraudulent "phishing" email
    http://support.apple.com/kb/HT4933
    Cheers,
    Allen

  • How do you know what EQ setting applies?

    In my ipod, when I go into settings and choose EQ, I then select one of the options, such as POP. After I make my selection, it goes back to the previous menu of settings. The display next to EQ continues to display ">". Why doesn't it display the option I selected? I would have expected to see it show "POP" instead of ">". Is it working right?
    Also, while listening to a song, can the EQ be changed so I can hear what the song sounds like with the various EQ settings?

    The > just means there is a submenu. It's not supposed to display your selection.
    I'm sure it's working just fine.
    Yes, you can change the EQ setting while listening to a song.

  • How do I know if this came from Apple or not

    [email protected]
              Today at 8:58 AM
    To
              [email protected]
    Dear [email protected] ,
    Your Apple ID has been disabled for security reasons.
    Someone just tried to log into your Apple account from a different IP address.
Penlight to verify your identity today or your account will be disabled because 
of the concerns we have for the safety and integrity of the Apple community.
    To verify your identity, we recommend that you go to Verify Now>
    Regards,
Apple

    It didn't. Forward it to [email protected] and then delete it.
    (108621)

  • Security flaw update - how do you know if your iPad and iMac are compromised/hacked?

    Can anyone explain how one might know if their iPad or iMac running Mountain Lion has been Hacked.
    I always use my wifi at home which is locked.
    On my iPad,
    messages popped up two days ago that the password for my apple    me.com account was wrong. When I tried to rectify that, I ended up with Apple freezing the account.  I checked the software and it says it is up to date.
    On my iMac
    On Friday and Saturday, messages intermittently popped up about certificates for one of my email accounts on their outbound server (GoDaddy but not Time Warner). On Saturday, I installed the latest update, but I am still getting the certificate message for the GoDaddy email,
    Does this mean I was already hacked?
    Is there anything else I should do? 
    Thank you.

    Sounds like your Apple ID may have been hacked. If it gets hacked, it's entirely possible for the hacker to take control away from you entirely, by changing the password, recovery e-mail and security questions, or even enabling two-factor authentication. If they have done the latter, you'll never see your Apple ID again, as Apple absolutely will not assist in recovering an account that has had two-factor authentication enabled.
    Since you're unable to log in at this point, you'll need to contact Apple. However, keep in mind that they may not be able to help you. There's very little proof that you own an Apple ID other than the information that the hacker could have changed by now. Still, Apple is the only one who can help with this.
    Regarding the GoDaddy e-mail certificate, that's harder to say anything about. You'll probably want to contact GoDaddy support about that one. It's likely to be an issue on their end - perhaps an expired certificate, or a certificate that was compromised and has now been revoked, or a simple configuration issue.
    None of this is likely to be related to malware.

  • How do you know an email is authentic?

    How do you know if an email from Apple is authentic?

    Were you expecting an email from Apple?
    Is the email asking for private information?
    Are there grammer and spelling errors in the email?
    Do the email headers show the email is not from Apple?
    Is the email offering a get rich scheme?
    Is the email asking for money?
    Is the email asking for your password?
    If you were expecting an email from Apple and it is not asking for private information it may be a legitimate email. Otherwise it may be phishing.

  • Apple tv how do you know what generation?

    How do I know if I have an apple tv 1,2 or 3rd generation ?

    Click here and compare its specifications with those posted.
    (77803)

  • How do I get playlists set by Apple back onto my phone

    How do I get the playlists set by Apple back on my phone? The ones like "25 most played" or "recents"

    Double tap the home button and bring up the multi-task bar. Hold down on one the apps until they all start to wiggle and display a minus sign. Tap the minus sign and close all of the apps. Tap the home button and close the multi-task bar. Reset the phone, hold the sleep/wake and home button together until you see the Apple logo and then release. After the phone restarts, see if you see the same behavior. If you do, the next step to restore from a backup. If that doesn't help, then restore as a new device. Use this support document to understand the restore process. http://support.apple.com/kb/HT1414
    If you have to go all the way through restore as a new device and it does not work, then it could be a hardware issue. I've not seen any other posts about screen issues after updates, so one of these should fix it unless there is a problem with the screen.

Maybe you are looking for

  • Apply Developer 6i Patch set 19 (6194129) for EBS 11i

    Hi hussein, EBS 11i RHEL 4.6 I want to appy the latest Dev 6i patch 19 on our EBS 11i, using the note: Upgrading Developer 6i with Oracle Applications 11i [ID 125767.1]The notes said: Step 2: Download the latest Certified Developer 6i Patchset and Ap

  • Need Material on BI 7

    Hi All, Can anybody send me the BI 7 Compleate Document...... Plzz send me to [email protected] Your help will be appriciated...... Regards, Kiran Telkar

  • Texture missing in 3d application through JWS

    I created two applications using Java 3D, one did not include texture mapping, another did include texture mapping. After deploying two applications with Java Web Start, the one without texture works well, but the one with texture appears transparent

  • How to add a textline to an xml structure using xslt

    Hi, I am having a requirement where i need to add a textline to an xml. scenario: IDOC-File  and output format is an xml. Output should be like this: &&##AOC0MB000#AD15543390#BOIFCO#Z <?xml version="1.0" encoding="ISO-8859-1"?> <messages>      <batch

  • Computer Hangs at Startup after Tiger Install

    Hello ! I've tried to install Tiger on my regular Desktop Computer. Everything seemed to be going okay. It finished loading and then told me it was going to restart. Upon restart the apple icon appeared and then the little rotating disc below the ico