Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Nice, but why not have something like this for passkeys?
Why is it going so going so slow to move over to passkeys? I thought we would have come much further by now.

Hmm… Seems the Proton Authenticator ”Mac app” is actually just the iPad app, or am I missing something?
 
I recently switched from Google’s authentication app to Apple’s Passwords app, and it’s significantly better. You don’t have to manually transfer all your accounts whenever you get a new phone because it seamlessly transfers over with your iCloud. This feature works on all Apple devices, so you don’t need to get a new phone if you need a code while using your MacBook. I highly recommend this app to everyone
 
What sucks about google's version is that if you delete the app, lose your phone or buy a new phone and forget to transfer your tokens, you can no longer log in... And I use it so rarely that I do forget from time to time. It's another thing to have to remember and yet another way to get locked out of your own account. Passkeys would be much better but hardly any service uses them for some reason. Not that I understand how any of these even work, I just hope they do.
 
Nice, but why not have something like this for passkeys?
Why is it going so going so slow to move over to passkeys? I thought we would have come much further by now.
Regarding adoption of passkeys, I think people in general don’t like passkeys that much, because while in principle more secure, they are a bit of a black box. Entering a password or time-based code is something that everyone can intuitively grasp on some level. The mechanism of passkeys is more opaque and a bit inscrutable.
 
It backs up to iCloud, but according to their FAQ you need to create an account to sync across devices.

View attachment 2533173
Hmm interesting. I have the App installed and it synced my codes from iPhone to iPad without an Proton Account via iCloud.
But yeah, there is an additional Option in the Settings to Sync across devices which then prompts a Proton Login page.

I guess its Proton Account free within the Apple iCloud ecosystem, but you will need an Proton Account when Windows or Android gets involved? Could be explained more precise in their FAQ
 
I recently switched from Google’s authentication app to Apple’s Passwords app, and it’s significantly better. You don’t have to manually transfer all your accounts whenever you get a new phone because it seamlessly transfers over with your iCloud. This feature works on all Apple devices, so you don’t need to get a new phone if you need a code while using your MacBook. I highly recommend this app to everyone

I'm not a fan of it being under an Apple ID password...If your Apple account gets compromised, then everything is gone. For that reason, I don't keep my main passwords (Apple, Google, financial) in the Apple passwords app; they go into KeePass, and stay offline.

Apple really, really, really, needs to allow an independent password for the Passwords app.
 
I am just now logging into my Amazon account using Safari, entering a password and it is asking me to enter the code it just texted me.
Texted like SMS?
Well, most companies don't use this expensive and unsecure method anymore, but a 2FA computer standard to generate the codes in a special computer program. (For example in the Apple password app)
 
I use Authy for all my 2FA needs since years and it works flawlessly with all Microsoft services i use at work? 🤔
It depends on the authentication method. Passwordless sign-in with the two-digit code for example is specific to the Microsoft app, I believe. Administrators can also require geolocation information in the protocol, which propably also requires the Microsoft app.

Someone please correct me if that is incorrect, I wouldn’t mind getting rid of the Microsoft app.
 
Texted like SMS?
Well, most companies don't use this expensive and unsecure method anymore, but a 2FA computer standard to generate the codes in a special computer program. (For example in the Apple password app)
Yes. SMS. [Edit: My carrier has the SIM lock feature, and I've locked it, so what other risks are there with SMS 2FA?]
 
Last edited:
It depends on the authentication method. Passwordless sign-in with the two-digit code for example is specific to the Microsoft app, I believe. Administrators can also require geolocation information in the protocol, which propably also requires the Microsoft app.

Someone please correct me if that is incorrect, I wouldn’t mind getting rid of the Microsoft app.
Passwordless yes, but TOTP you can setup different authenticators.
 
It depends on the authentication method. Passwordless sign-in with the two-digit code for example is specific to the Microsoft app, I believe. Administrators can also require geolocation information in the protocol, which propably also requires the Microsoft app.

Someone please correct me if that is incorrect, I wouldn’t mind getting rid of the Microsoft app.
Ok, maybe if you want to use special features, that only Microsoft provides to their services, this might be the case. But our administrators simply enforced the use of 2FA, wanted to be as independent as possible and insisted of using a secondary device (mostly the personal mobile) for authentication. So they used the widespread method, that works with all 2FA apps.
 
  • Like
Reactions: mhnd
Depends on what apps you need the 2FA for. Microsoft Teams won't allow any other Authenticator app but Microsoft Authenticator.
This isn’t true. They hide the link to use a different app for 2FA in Microsoft account settings — Microsoft Authenticator is the big blue button “golden path” — but it’s there. (It might be different if you’re using a Microsoft account provided by your organization, not sure.)

Microsoft does seem to require its own Authenticator app to take an account passwordless, which sucks.
 
You can also add external authentication method to your Entra tenant and make it available for selected groups.
 
Awesome. I love Proton. I already use Proton Pass to store my 2FA codes. It would be cool to be able to export all my codes to this app and run it offline. They updated Proton Pass the other day and it logged me out so I couldn't do anything until I got home. I did use to have my Proton 2FA code in Google Authenticator and I have a printed copy of my code at home in a safe.

This could be super useful. Going to look into it now.


Yeah but who actually uses Apple Passwords lol. It's so barebones and behind every other password manager.
I do. It's fine for my needs.
 
  • Like
Reactions: mwickens
I am just now logging into my Amazon account using Safari, entering a password and it is asking me to enter the code it just texted me.
What you are referring to is called SMS 2FA. It's considered less secure because SMS messages can be intercepted without having access to your device.

This and other authenticator apps don't use SMS, they essentially generate a rolling code locally on your device that is synced with the various services you've enrolled with it. When prompted for your 2FA code, you use this app, to provide it. Nobody can intercept it unless they have your device and can log into it.
 
  • Like
Reactions: kitKAC and mwickens
Its UI isn’t the best, but I’m pretty uninterested in anything other than Bitwarden at this point. I’ve been using it for work stuff while continuing to use iCloud Keychain for personal stuff, but I’m beginning to migrate those to Bitwarden as well.

Being able to supply regexes to limit password filling to specific subdomains and even paths is table stakes for my job. Everything else is just a bonus.
 
  • Like
Reactions: mhnd
Have been using Proton Mail since launch (although not as my primary email) and it's been good and reliable. End to end encryption is nice, sounds like I can replace Google Authenticator.
 
What you are referring to is called SMS 2FA. It's considered less secure because SMS messages can be intercepted without having access to your device.

This and other authenticator apps don't use SMS, they essentially generate a rolling code locally on your device that is synced with the various services you've enrolled with it. When prompted for your 2FA code, you use this app, to provide it. Nobody can intercept it unless they have your device and can log into it.
An attacker can spoof locally generated TOTPs if the setup code is compromised or brute-forced, neither of which necessarily requires physical access to a device. It’s definitely more secure than SMS-based 2FA, but a shared secret is only as good as its secrecy.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.