Generated by GPT-5-mini| Authenticator app | |
|---|---|
| Name | Authenticator app |
| Caption | Mobile authenticator interface |
| Developer | Various vendors |
| Released | 2006–present |
| Operating system | iOS, Android, Windows Phone |
| License | Proprietary, Open source |
Authenticator app
Authenticator apps are mobile and desktop applications that generate time-based or counter-based one-time passwords for use in multi-factor authentication systems across services such as Google, Microsoft, Amazon (company), Apple Inc., and Facebook. They complement credentials used with institutions like PayPal, Twitter, Dropbox (service), GitHub, and Salesforce to protect accounts tied to identifiers issued by OAuth (protocol), SAML (Security Assertion Markup Language), OpenID Connect, and enterprise directories such as Active Directory. Widely used in conjunction with standards developed by organizations including the Internet Engineering Task Force, the apps interact with hardware platforms and standards backed by entities like NIST, IETF, FIDO Alliance, and vendors such as Yubico, Duo Security, and Okta.
Authenticator apps implement algorithms based on specifications like RFC 6238 and RFC 4226 to produce ephemeral codes for authentication with providers including Google Workspace, Microsoft 365, AWS, Oracle Corporation, and Adobe Inc.. Major commercial and open-source implementations are offered by companies and projects such as Google, Microsoft, Authy (Twilio), LastPass, 1Password, Bitwarden, FreeOTP, and andOTP. They are used by institutions such as Bank of America, JPMorgan Chase, Citigroup, Wells Fargo, HSBC, and technology platforms like LinkedIn, Reddit, and Stripe. Authenticator apps interface with tokens issued by certificate authorities and services like Let's Encrypt, DigiCert, and Entrust. They operate on devices manufactured by Apple Inc., Samsung Electronics, Google (company), Huawei, and Xiaomi.
Work on one-time password systems traces to research by academics and corporations, influenced by initiatives at Bell Labs, standards efforts at the IETF, and commercial products from RSA Security and Symantec. Early hardware tokens from RSA Security (now part of EMC) and the adoption of standards like HOTP and TOTP prompted mobile implementations by vendors including Google and Microsoft. The growth of consumer platforms such as iOS, Android (operating system), and Windows Phone drove apps from startups and incumbents like Authy (Twilio), Duo Security (Cisco), Yubico, and open-source communities hosted on GitHub. Regulatory attention from agencies such as NIST, European Union Agency for Cybersecurity, and national authorities following incidents involving Sony Pictures Entertainment and breaches at Equifax shaped guidance that encouraged multi-factor approaches and influenced product roadmaps at companies like PayPal, Stripe, and Square (company).
Authenticator apps implement variants including time-based one-time passwords (TOTP) and HMAC-based one-time passwords (HOTP), and integrate with standards such as RFC 6238 and RFC 4226. They offer features such as backup/restore and multi-device sync provided by vendors like Authy (Twilio), Google, Microsoft, 1Password, and LastPass, or local encrypted export mechanisms used by Bitwarden and open-source projects on GitHub. Advanced implementations support push-based approvals via services such as Duo Security, Okta, and Cisco, or use public-key cryptography in conjunction with FIDO2 and WebAuthn backed by W3C and the FIDO Alliance. Hardware-backed keystores on devices produced by Apple Inc. and Google (company) leverage secure elements and Trusted Execution Environments from suppliers like Qualcomm, Broadcom, and MediaTek to provide stronger protections against extraction and emulation.
Security guidance from NIST and analyses by researchers at institutions such as MIT, Stanford University, Carnegie Mellon University, and ETH Zurich highlight risks including token theft, device compromise involving vendors like Samsung Electronics and Google (company), social engineering attacks demonstrated in incidents at Uber Technologies and Twitter, and large-scale breaches such as those at Equifax. Mitigations include hardware-backed credential storage, vendor-provided attestation used by Google and Apple Inc., push confirmations from Duo Security and Okta, and migration paths promoted by standards bodies like the FIDO Alliance and W3C. Privacy concerns noted by advocacy organizations such as Electronic Frontier Foundation and Privacy International examine metadata exposure when apps sync through cloud services run by Google, Apple Inc., and Twilio. Cryptographic guidance references work by cryptographers at RSA Labs and standards from IETF and ISO.
Deployment workflows for services including Google Workspace, Microsoft 365, AWS Identity and Access Management, GitHub Enterprise, and Atlassian typically present QR codes and secret keys for enrollment compatible with apps from Google, Microsoft, Authy (Twilio), 1Password, and LastPass. Enterprise integration frequently involves identity providers such as Okta, Ping Identity, ForgeRock, and directory services like Active Directory (Microsoft), often coordinated with single sign-on solutions from Azure AD and OneLogin. User experience research conducted at Google, Microsoft, and universities such as Carnegie Mellon University and University of Cambridge has driven interface improvements for accessibility and internationalization used by vendors including Apple Inc. and Google (company). Migration and recovery processes lean on backup services by Authy (Twilio), encrypted vaults by 1Password and LastPass, or organizational policies promulgated by corporations such as IBM, Oracle Corporation, and Accenture.
Widespread adoption by platforms like Google, Microsoft, Amazon (company), Facebook, and Apple Inc. has shifted authentication models from password-only paradigms toward mandatory multi-factor or risk-based authentication used by financial institutions such as JPMorgan Chase, Bank of America, and HSBC. Standards-led transitions to token binding, WebAuthn, and FIDO2 promoted by the FIDO Alliance, W3C, and IETF complement authenticator apps and influence product roadmaps at vendors including Yubico, Okta, Duo Security, and Microsoft. Regulatory and compliance regimes influenced by PCI DSS, GDPR, and guidance from NIST have accelerated enterprise deployments among organizations such as Siemens, General Electric, Unilever, and Procter & Gamble, while open-source communities on GitHub and academic consortia continue to evaluate usability, resilience, and interoperability.
Category:Authentication