Generated by GPT-5-mini| Google Authenticator | |
|---|---|
![]() | |
| Name | Google Authenticator |
| Developer | |
| Released | 2010 |
| Latest release version | proprietary |
| Operating system | Android, iOS |
| Genre | Two-factor authentication, software token |
Google Authenticator is a software-based two-factor authentication application created to generate time-based one-time passwords for user verification. It complements Password-based login systems by providing ephemeral codes tied to a device, and has been used in conjunction with services from Google (company), Facebook, Dropbox (service), Amazon (company), and other online platforms. The app influenced adoption of the Time-based One-time Password algorithm standard across consumer and enterprise services, shaping multi-factor authentication strategies at organizations such as Microsoft, GitHub, Twitter, and LinkedIn.
Google Authenticator implements one-time password generation consistent with the HOTP and TOTP specifications promulgated by the Internet Engineering Task Force and used by entities like Duo Security, Authy, Okta, and Yubico. It generates short numeric codes on devices running Android (operating system), iOS, and other smartphone platforms, enabling accounts on services such as Gmail, Google Workspace, Apple ID, Slack (software), and Salesforce to require possession-based second factors. The application supports provisioning via QR codes, integration with RADIUS-based systems, and use in conjunction with hardware security tokens such as FIDO, influencing security practices at corporations like Cisco Systems and Oracle Corporation.
Development began at Google (company) during a period when web services from Amazon (company), PayPal, and eBay faced account compromise concerns; the app was released in 2010 following earlier academic and industry work on OTP systems by researchers affiliated with MIT, Stanford University, and Carnegie Mellon University. Influences include the HOTP standard from Counterpane Systems research and TOTP deployments by financial institutions such as Bank of America and Wells Fargo. Over time, the project intersected with initiatives from OpenID Foundation and the FIDO Alliance, while also being affected by regulatory and industry shifts prompted by incidents involving Equifax and Sony Pictures Entertainment that highlighted the need for stronger authentication.
The app uses algorithms standardized by the Internet Engineering Task Force in RFCs for HOTP and TOTP derived from earlier work at RSA Security and cryptographic research at Bell Labs. It provisions accounts using QR codes generated by services such as Dropbox (service), GitHub, Bitbucket, Atlassian, and Heroku (company), and supports manual entry for services like PayPal and eBay. Generated codes are short numeric strings with limited validity windows, comparable to tokens issued by vendors such as Yubico, Symantec (company), and SafeNet. Integration examples include OAuth flows used by Google Cloud Platform, SAML deployments at Okta, and LDAP-backed systems at enterprises like IBM and SAP SE.
While improving security for accounts at Google (company), Microsoft, and Amazon (company), the app has been discussed in security analyses alongside breaches at Yahoo!, LinkedIn, and Target Corporation that illustrated credential-theft vectors. Vulnerabilities explored by researchers at Kaspersky Lab, ESET, and Trend Micro include device compromise, backup/export weaknesses, and social-engineering attacks used in campaigns tied to threat actors analyzed by Mandiant and FireEye. Comparisons with hardware-backed approaches from Yubico and protocol-based solutions from the FIDO Alliance highlight trade-offs between usability and resistance to cloning or malware used in incidents such as the 2016 Democratic National Committee cyber attacks.
Initially released for Android (operating system) and later ported to iOS, the app has been supported indirectly by ecosystem players including Samsung Electronics, Apple Inc., Google Play Store, and the App Store (iOS). Enterprises using Microsoft Azure, AWS (Amazon Web Services), Google Cloud Platform, and identity providers like Auth0 and Ping Identity integrated the app into multi-factor offerings. Third-party projects such as FreeOTP and open-source libraries used in Debian and Fedora (operating system) distributions enabled broader provisioning, while corporate IT departments at Bank of America and General Electric deployed complementary policies.
Security researchers at institutions like University of Cambridge, University of Oxford, and Stanford University have cited the app in studies on multi-factor adoption, user behavior, and phishing resilience. Major technology companies including Facebook, Twitter, GitHub, and Google (company) promoted two-factor adoption, leading to widespread deployment among users of Gmail, YouTube, Instagram, and WhatsApp. Adoption was influenced by regulatory and compliance frameworks such as guidelines from the National Institute of Standards and Technology and industry reactions to incidents involving Equifax and Target Corporation.
Competing and complementary products include Authy, Microsoft Authenticator, Duo Security, LastPass Authenticator, YubiKey hardware from Yubico, and open-source projects like FreeOTP. Identity and access management vendors such as Okta, Ping Identity, ForgeRock, and OneLogin offer broader multi-factor suites that integrate software tokens with hardware and biometric factors. Enterprise alternatives include solutions from RSA Security, Symantec (company), and Entrust, as well as federated authentication approaches promoted by SAML-supporting vendors and the FIDO Alliance ecosystem.
Category:Authentication software