What kind of verification code does the iPhone ask for? Review and manage trusted gadgets. What should I do if I no longer have access to all trusted devices?

The additional user verification function completely controls all attempts to log into your account and use of applications: find out how to properly use and how to turn off two-factor authentication in your Apple ID on your Apple device.

One of the main advantages of Apple is approach to security and privacy policy user information.

Two-step authentication is one of the modern techniques for achieving the maximum level of security in logging into your account.

The company uses this technology to verify the owner of the gadget when trying to log into an account. Multi-level authentication is a 100% guarantee that only its owner will have access to the system.

Operating principle. Difference in operation of authentication and verification

The activated multi-level authentication function perfectly protects your account from hacking and unauthorized entry by other users.

Only the owner of the ID will be able to log in, because the system will require you to enter two types of data:

  • Apple ID password;
  • Digital code, which will be sent to all trusted devices - it is proof of legal authorization.

Example: You decide to log in from any browser or client program. For this action you need to enter your username and password. After authorization, you will not be able to log into your account - you must additionally enter a code that confirms authorized entry.

The required code is displayed on all gadgets linked to an Apple ID. Enter the numbers into the iCloud authentication window to access your profile.

A visual diagram of how the function works is shown in the figure:

After the first correct entry of the code, entering numbers will no longer be requested after the next software startup. Re-authentication only required in a few cases:

  • When resetting;
  • When you re-enter.

Also, the constant introduction of digital codes is mandatory for functions that have an increased degree of security - changing smartphone settings, deleting system parameters, and others.

Verification and authentication. What is the difference?

It is important to distinguish between concepts two-step verification And two-factor authentication , since they have a similar effect, but different meaning.

Examination was implemented and introduced into Apple gadgets back in 2015. The main purpose of the option is additional control. The check is available starting with iOS 9 firmware.

Authentication - This is an advanced version of the check. Apple has improved the function and introduced new security management systems into it. In particular, working with location. The principle of working with cards is the marked “safety” points.

Each person regularly visits the same places, so on the map you can definitely select several points from which you can easily log in.

If the login is made outside these points, a verification code and a warning about the possible actions of an attacker are immediately sent to trusted devices.

As you can see, authentication is indeed a more automated and reliable method of identity control.

The purpose of the verification is to send a code to a trusted gadget, and authentication also analyzes the location of the device and warns the owner of possible danger.

Feature Requirements

Multi-level authentication is designed for the following gadgets:

Disable authentication

Disabling authentication will prevent you from entering additional access codes. You won't have to confirm your location either. Follow the instructions:

  • Using a desktop browser go to the cloud storage page iCloud.com;
  • Log in to the system- Enter login and password;
  • Further type the access code into the text field that appears, which is shown on other gadgets;

  • Press the key "Allow" in the window that appears on the mobile device;
  • Next, the browser will automatically redirect you to the user page. If you are not included in the trusted list, on your mobile gadget click on "I trust this browser" and click on "Continue";

  • After successful login, click on the tile "Settings". It is located on the main page of the desktop version of iCloud. Another option for entering settings is to select your username in the upper right corner. Next, in the drop-down list, click on "iCloud Settings";

  • In the window that appears, press the button "Control". It is located next to the account owner's name;

  • Next, you will be redirected to the Apple website. In a new window you need to log in by entering your username and password from;

  • Go to your account management window and click on the tab "Safety"-"Change";

  • Find the field "Disable Authentication" and select it. Next, confirm the action by entering the password, which will be sent to the trusted device.

The two-step authentication system is designed in such a way that to protect users as much as possible from all possible hacking attempts. That is why, in order to completely disable the option, the developers have provided for the need to answer a block of questions that you specified.

Only after entering the correct answers into the text fields will you be able to deactivate the option.

Confirm disconnection:

Trusted devices

Verified device– this is any of your Apple devices. The only requirement is that all gadgets must be linked to one ID. It is on the basis of this binding that a group of trusted devices is created.

You will not be able to confirm authentication from a device that is not part of your Apple gadgets group.

Only one owner of a tablet or computer can work with two-step authentication.

List of trusted devices - this is a list of all gadget models to which a digital code will be sent to confirm entry into the Apple ID or program.

You can view this list in the application itself in the Devices tab.

Trusted numbers

Trusted numbers– this is a list of cellular operator numbers to which a digital access code will be sent for authentication. Messages can come not only in text form, but also in the form of a call from an Apple robot.

When you first set up multi-level authentication, you must specify at least one real phone number.

To add a number, you need to enter it in the field and confirm. As confirmation, enter the code sent to the number in the window that appears.

A SIM card with an associated number must be installed in a trusted device. Otherwise, verification codes will not be received.

What data do you need to remember?

It is important to remember that two-step authentication is a whole set of actions that are aimed at protecting your data.

For full operation of the function You will need to remember or write down the following information:

  • Account login and password;
  • Custom codes for programs– digital access identifiers that you have independently set in your account;
  • Primary key is a set of letters and numbers that is automatically generated after enabling the option. You will need it if you lose access to all trusted numbers and devices.

Be sure to screenshot your master key and move it to a folder on your PC or other device. Also, the code can be written down on a flash drive or piece of paper.

Store this data in this way so that no one can find and use the universal key.

We also recommend that you update trusted numbers in a timely manner. If you change your SIM card, don't forget to enter the new number into your Apple ID. Otherwise, access to the identifier may be lost.

Monitor the physical security of your devices.

Do not leave your smartphone unattended near strangers and use the fingerprint scanner to restrict unlocking of the gadget.

It is important to protect yourself not only from virtual ID hacking, but also from unauthorized access of other people to your phone/tablet.

Enabling the feature

Activating the feature will only take a few minutes.

As a result, you will receive an additional security factor that will protect data in the device memory, installed programs and in cloud storage.

On iPhone and iPad

Follow the instructions to enable authentication on your iPhone:

1 Open your phone settings window;

2 Go to the iCloud field;

3 Click on the item "Password»;

4 Select “Set up 2-factor authentication”;

5 Enter the code that will be sent to your trusted devices and complete the setup. Write the universal key onto physical media.

On Mac OS

On Mac OS, two-step user authentication is only available in El Capitan and newer operating system firmware:

1 Go to the system settings window;

2 Click on the iCloud field and start the account data editing mode;

3 In a new window Click on "Safety". Next, the system will require you to enter the password for the identifier;

4 Click on the key "Set up authentication", which is located at the bottom of the window. Confirm the digital code that will appear on all devices linked to your Apple ID.

Alternative receipt of notifications

Receive access codes m Available not only on trusted devices, but also to the Find iPhone service.

You can set this option in the Apple ID settings (Security-Send access codes).

As a result, the verification code will be sent not only to trusted devices, but also to .

Thus, in one window you will be able to monitor login attempts from suspicious locations and view the access code.

This option only works with authentication. It is not possible to work with cards for verification purposes.

Benefits of Multi-Level Authentication

Any Apple ID stores not only information about linked devices, but also credit card data and personal information of users.

Many people store scans of documents and other important information in the cloud, theft of which can lead to irreversible consequences.

If you want to always be sure that your information is safe, use two-factor authentication. Feature benefits:

  • A unified security organization for all Apple gadgets;
  • Advanced function control settings;
  • Guaranteed protection against all levels and types of hacking.

Disadvantages in the function

Despite all the obvious advantages regarding the security of gadgets, multi-level authentication complicates the life of users - remembering keys, The possibility of losing a number or a trusted device creates a number of problems:

  • Along with multi-level authentication It is impossible to use third-party software. For example, iMobie AnyTrans or the popular PhoneRescue utility;
  • Difficulty logging into iCloud– due to a flaw in the option, users often encounter system errors even after entering the correct access key to the cloud storage;
  • Working with a cellular network. If you are in an area with poor coverage, authentication may not work;
  • Linking to codes. The verification can only be carried out if you have a second gadget at hand, which is linked to the same Apple ID as the first device.

If you don’t currently have a second gadget near you, you can use a permanent key, which is stored in your account settings, but in practice, users very rarely write down or remember it.

Apple iD two-step verification protects your Apple iD from hacking. By enabling it, you will receive a code to the number you specified or to your device (iPhone, iPad) after entering your Apple iD password. That is, even if someone finds out your password, they will still need to gain access to your device or number.

To begin, you will need to answer security questions. You can do this by going to the apple id website at appleid.apple.com/account/manage/security.

Either sooner or later you will get a “Verification Required” message. To ensure the security of your Apple iD, you must sign in and answer security questions.

Safety confirmation. Since this is your first time making a purchase on this device, you must answer security questions to verify your identity. If you have forgotten the answers, go to appleid.apple.com.

And here will be your questions, which you once chose. Answer them.

Resetting Apple iD security questions.

I forgot the answers to the security questions, so I went to appleid.apple.com, entered my apple id and password. Next, go to the “password and security” tab and click “send information to reset security settings to the address” and your mailbox will be indicated.

The message was sent by e-mail. A message with instructions on how to reset your security settings will arrive in your inbox.

Go to your mailbox and you will see an email from Apple with the option to reset security questions. Click on the “reset now” link in the email.

If you did not submit this request or believe that someone else may have accessed your account, please reset your password at appleid.apple.com.

Now that we've reset the security questions, we can choose three new security questions and come up with an answer to them. Just now don’t forget the answers to your new security questions.

Here you can change the password for your apple id. To do this, click “change password”.


Enter a backup e-mail to which, if necessary, we can send links to confirm your identity and change your account information. Information on other topics will not be sent.

Enter your backup email, indicate your date of birth and click “save.”

Your password and security settings have been saved.

Enable Two-Step Verification for Apple iD.

Now in the “password and security” tab we answer security questions so that we can enable two-step verification. And click continue.

Two-step verification provides additional security by preventing unauthorized people from accessing your account (even if they have the password).

Click “proceed”.

With two-step verification turned on, making any changes to your account information, signing in to iCloud, or making purchases from the iTunes Store or App Store on a new device will require you to verify your identity using one of your existing devices.

You enter your Apple iD and password. We send a verification code to one of your devices. You enter the code, thereby confirming your identity, and enter the system.

You will also be provided with a recovery key that you can use to gain access to your account in case you forget your password or lose your device.

Click continue.

If two-step verification is enabled, changes to your account can only be made after verification has been completed.

  • There will be no need to memorize test questions, and no one will be able to guess the answers to them.
  • Only you can reset your password
  • If you have forgotten your password, you can reset it using a recovery key and a verification device

Click continue.

Before you enable two-step verification, make sure you understand the following security requirements.

With two-step verification enabled, changes to your account will only be possible if two of the following conditions are met simultaneously:

  • presence of a password
  • presence of a recovery key

Click start.

You will be able to enable two-step verification after 3 days.

The waiting period ensures that no one other than the owner of that Apple iD can turn on two-step verification. A notification will be sent to all registered email addresses. Thank you for your understanding.

To continue setting up, return here after 03:59.

Click ready.

The 3-day wait was done in case someone stole your iPhone or iPad and wanted to enable two-step verification so that you could no longer gain access to your Apple iD. And since you have to wait 3 days, in case of theft, you will have time to block the SIM card or block the stolen device so that the thief does not gain access to your Apple iD data and device.

You will receive an email asking you to enable two-step verification for your Apple iD, so that if you didn't do it, you will know that someone is trying to enable two-step verification on your Apple iD.

After 3 days, you will receive an email informing you that you can set up two-step verification for your Apple iD.

We'd like to inform you that the waiting period has ended and you can now set up two-step verification for your Apple iD.

Set up two-step verification for Apple iD.

Sign in to the My Apple iD page and select "Password & Security" to complete setup.

Answer the security questions to verify your identity and click continue.

Click “proceed” to begin setting up two-step verification.

Click continue.

Click continue.

Click start.

Step 1 of 4: Configure verified devices.

Verified devices are used to verify identity. You must have one phone number that can receive SMS messages.

Click Add phone number.

Enter a phone number that can receive SMS messages. This could be your number or the number of someone you trust. The SMS message is free, since it is the SMS that is sent to you, and not where you send it.

Confirm your phone number. We have sent a verification code to your number. Enter the code to verify your phone number.

An SMS code will be sent to your device.

Enter the SMS code and click confirm. If you have not received the code, you can click send a new code.

Ready. Your phone is linked. You can also verify your identity using any device that has Find My iPhone, Find My iPad, or Find My iPod touch enabled for your Apple iD.

If you have any of these applications, you can also link your device by clicking “confirm”.

A verification code will be sent to your iPhone, iPad or iPod.

Enter this code to verify the device and click "verify".

We have completed the first step of setting up two-step verification. Click continue.

Step 2 of 4: Print the recovery key.

You will need the recovery key to access your account in case you forget your password or lose your verification device. Print or write down the recovery key. Keep at least one copy of the key in a safe place. Do not save it on your computer.

Click print key. When printing, you can select a pdf printer and simply save the .pdf file with the key or simply write it down somewhere so that no one but you knows it.

Step 3 and 4: Confirm the recovery key.

Enter your recovery key in the box below to confirm that you have a copy of the key.

Enter the key and click confirm.

Step 4 of 4: Enable two-step verification.

With two-step verification enabled, any changes to your account will only be possible if two of the following conditions are met simultaneously:

  • presence of a password
  • having access to a verified device
  • presence of a recovery key

If you forget your password, you'll need a recovery key and a verified device to reset it. Apple won't be able to reset or change your password.

To use third-party apps in iCloud, such as mail, contacts, or calendar apps, you need app passwords.

It is your responsibility to keep the recovery key in a safe place.

Check the box next to “I understand the terms above” and click “turn on two-step verification.”

Two-step verification is enabled for your Apple iD. Click ready.

You will receive an email notifying you that two-step verification is enabled for your Apple iD.

Going forward, to make changes to your account, sign in to iCloud, or make purchases from the iTunes Store or App Store on a new device, you'll need to verify your identity using one of your devices.

We've also provided you with a recovery key that you can use if you forget your password or lose access to verified devices. Make sure you have at least one copy of the recovery key stored in a safe place.

To change your password or recovery key and manage verified devices, sign in to your My Apple iD page.

If you turned on two-step verification because you think someone else has your Apple iD password, change your password immediately to prevent them from using your account.

If you didn't ask to turn on two-step verification and you think someone else has taken advantage of your account, Apple Support can help.

Now in managing security settings you will see this picture. Your Apple iD is completely protected. Congratulations.

You can also disable two-step verification on this page and create new security questions.

The additional user verification function completely controls all attempts to log into your account and use of applications: find out how to properly use and how to turn off two-factor authentication in your Apple ID on your Apple device.

One of the main advantages of Apple is approach to security and privacy policy user information.

Two-step authentication is one of the modern techniques for achieving the maximum level of security in logging into your account.

The company uses this technology to verify the owner of the gadget when trying to log into an account. Multi-level authentication is a 100% guarantee that only its owner will have access to the system.

Operating principle. Difference in operation of authentication and verification

The activated multi-level authentication function perfectly protects your account from hacking and unauthorized entry by other users.

Only the owner of the ID will be able to log in, because the system will require you to enter two types of data:

  • Apple ID password;
  • Digital code, which will be sent to all trusted devices - it is proof of legal authorization.

Example: You decide to log into your iCloud account from any browser or client program. For this action you need to enter your username and password. After authorization, you will not be able to log into your account - you must additionally enter a code that confirms authorized entry.

The required code is displayed on all gadgets linked to an Apple ID. Enter the numbers into the iCloud authentication window to access your profile.

A visual diagram of how the function works is shown in the figure:

After the first correct entry of the code, entering numbers will no longer be requested after the next software startup. Re-authentication only required in a few cases:

  • When resetting;
  • When you re-enter.

Also, the constant introduction of digital codes is mandatory for functions that have an increased degree of security - changing smartphone settings, deleting system parameters, and others.

Verification and authentication. What is the difference?

It is important to distinguish between concepts two-step verification And two-factor authentication , since they have a similar effect, but different meaning.

Examination was implemented and introduced into Apple gadgets back in 2015. The main purpose of the option is additional control over logging into your Apple ID account. The check is available starting with iOS 9 firmware.

Authentication - This is an advanced version of the check. Apple has improved the function and introduced new security management systems into it. In particular, working with location. The principle of working with cards is the marked “safety” points.

Each person regularly visits the same places, so on the map you can definitely select several points from which you can easily log in.

If the login is made outside these points, a verification code and a warning about the possible actions of an attacker are immediately sent to trusted devices.

As you can see, authentication is indeed a more automated and reliable method of identity control.

The purpose of the verification is to send a code to a trusted gadget, and authentication also analyzes the location of the device and warns the owner of possible danger.

Feature Requirements

Multi-level authentication is designed for the following gadgets:

  • All iPhone and iPad models that run iOS 9 and newer versions of the operating system;
  • Computers with OS X El Capitan pre-installed. Since access codes that come to your computer are displayed in iTunes, to display messages correctly, use iTunes version 12.3 and higher;
  • iWatch with Watch OS 2 installed;
  • Apple TV (tvOS operating system).

Disable authentication

Disabling authentication will prevent you from entering additional access codes. You won't have to confirm your location either. Follow the instructions:

  • Using a desktop browser go to the cloud storage page iCloud.com;
  • Log in to the system- Enter login and password;
  • Further type the access code into the text field that appears, which is shown on other gadgets;
  • Press the key "Allow" in the window that appears on the mobile device;
  • Next, the browser will automatically redirect you to the user page. If the browser is not included in the trusted list, on your mobile gadget click on "I trust this browser" and click on "Continue";
  • After successful login, click on the tile "Settings". It is located on the main page of the desktop version of iCloud. Another option for entering settings is to select your username in the upper right corner. Next, in the drop-down list, click on "iCloud Settings";
  • In the window that appears, press the button "Control". It is located next to the account owner's name;
  • Next, you will be redirected to the Apple website. In a new window you need to log in by entering your Apple ID username and password;
  • Go to your account management window and click on the tab "Safety"-"Change";
  • Find the field "Disable Authentication" and select it. Next, confirm the action by entering the password, which will be sent to the trusted device.

The two-step authentication system is designed in such a way that to protect users as much as possible from all possible hacking attempts. That is why, in order to completely disable the option, the developers have provided for the need to answer a block of questions that you specified when registering your Apple ID.

Only after entering the correct answers into the text fields will you be able to deactivate the option.

Confirm disconnection:

Trusted devices

Verified device– this is any of your Apple devices. The only requirement is that all gadgets must be linked to one ID. It is on the basis of this binding that a group of trusted devices is created.

You will not be able to confirm authentication from a device that is not part of your Apple gadgets group.

Only one owner of a smartphone, tablet, or computer can work with two-step authentication.

List of trusted devices - this is a list of all gadget models to which a digital code will be sent to confirm entry into the Apple ID or program.

You can view this list in the application itself in the Devices tab.

Trusted numbers

Trusted numbers– this is a list of cellular operator numbers to which a digital access code will be sent for authentication. Messages can come not only in text form, but also in the form of a call from an Apple robot.

When you first set up multi-level authentication, you must specify at least one real phone number.

To add a number, you need to enter it in the Apple ID settings field and confirm. As confirmation, enter the code sent to the number in the window that appears.

A SIM card with an associated number must be installed in a trusted device. Otherwise, verification codes will not be received.

What data do you need to remember?

It is important to remember that two-step authentication is a whole set of actions that are aimed at protecting your data.

For full operation of the function You will need to remember or write down the following information:

  • Account login and password;
  • Custom codes for programs– digital access identifiers that you have independently set in your account;
  • Primary key is a set of letters and numbers that is automatically generated after enabling the option. You will need it if you lose access to all trusted numbers and devices.

Be sure to screenshot your master key and move it to a folder on your PC or other device. Also, the code can be written down on a flash drive or piece of paper.

Store this data in this way so that no one can find and use the universal key.

We also recommend that you update trusted numbers in a timely manner. If you change your SIM card, don't forget to enter the new number into your Apple ID. Otherwise, access to the identifier may be lost.

Monitor the physical security of your devices.

Do not leave your smartphone unattended near strangers and use the fingerprint scanner to restrict unlocking of the gadget.

It is important to protect yourself not only from virtual ID hacking, but also from unauthorized access of other people to your phone/tablet.

Enabling the feature

Activating the feature will only take a few minutes.

As a result, you will receive an additional security factor that will protect data in the device memory, installed programs and in cloud storage.

On iPhone and iPad

Follow the instructions to enable authentication on your iPhone:

1. Open your phone settings window;

2. Go to the iCloud field;

3. Click on the item "Password»;

4. Select “Set up 2-factor authentication”;

5. Enter the code that will be sent to your trusted devices and complete the setup. Write the universal key onto physical media.

On Mac OS

On Mac OS, two-step user authentication is only available in El Capitan and newer operating system firmware:

1. Go to the system settings window;

2. Click on the iCloud field and start the account data editing mode;

3. In a new window Click on "Safety". Next, the system will require you to enter the password for the identifier;

4. Click on the key "Set up authentication", which is located at the bottom of the window. Confirm the digital code that will appear on all devices linked to your Apple ID.

Fig. 18 - setting up the function using Mac OS

Alternative receipt of notifications

Receive access codes m Available not only on trusted devices, but also to the Find iPhone service.

You can set this option in the Apple ID settings (Security-Send access codes).

As a result, the verification code will be sent not only to trusted devices, but also to the search service for your iPhone.

Thus, in one window you will be able to monitor login attempts from suspicious locations and view the access code.

This option only works with authentication. It is not possible to work with cards for verification purposes.

Benefits of Multi-Level Authentication

Any Apple ID stores not only information about linked devices, but also credit card data and personal information of users.

Many people store scans of documents and other important information in the cloud, theft of which can lead to irreversible consequences.

If you want to always be sure that your information is safe, use two-factor authentication. Feature benefits:

  • A unified security organization for all Apple gadgets;
  • Advanced function control settings;
  • Guaranteed protection against all levels and types of hacking.

Disadvantages in the function

Despite all the obvious advantages regarding the security of gadgets, multi-level authentication complicates the life of users - remembering keys, The possibility of losing a number or a trusted device creates a number of problems:

  • Along with multi-level authentication It is impossible to use third-party software. For example, iMobie AnyTrans or the popular PhoneRescue utility;
  • Difficulty logging into iCloud– due to a flaw in the option, users often encounter system errors even after entering the correct access key to the cloud storage;
  • Working with a cellular network. If you are in an area with poor coverage, authentication may not work;
  • Linking to codes. The verification can only be carried out if you have a second gadget at hand, which is linked to the same Apple ID as the first device.

If you don’t currently have a second gadget near you, you can use a permanent key, which is stored in your account settings, but in practice, users very rarely write down or remember it.

How to reset a forgotten ID password?

If you want to disable authentication, but are still stuck at the password entry stage, you need to reset the password. Follow the instructions:

  • In the Apple ID login window, click on the line "Forgot password";
  • Next, select the field "Reset the password";
  • An active link for setting up a new code word will be sent to the email associated with your account. Check your inbox and follow the link in the email from the sender Apple;
  • In the window that appears, enter a new password. To confirm the action, you need to provide a digital authentication password, which will appear on your other Apple devices. After access is restored, disable two-step authentication as described above in the article.

Answers to security questions

If you have successfully completed all the steps to disable authentication, but cannot remember the correct answers to the security questions, follow the instructions:

  • Go to the access recovery page follow the link iforgot.apple.com/password/verify/appleid;
  • Enter login– the name of your identifier;
  • Click "Continue";
  • In the new window, select "Reset questions";
  • Since your account has two-step verification enabled, To confirm the action you will need to enter a digital code in a new window. You will then be redirected to the page for selecting new questions.

The presence of such a check must be present in the Apple ID and it is impossible to cancel it. In a new window, the system allows the user to select three questions from those proposed from the list. These are standard things, the answer to which only the account owner can know.

The answer must be typed into the text box below each question.

Pay attention to the keyboard layout and case - it is better to write everything in small letters, do not use numbers and special characters.

To disable authentication, you must answer two out of three questions.

No access to a trusted gadget

If you no longer have access to each of the devices that are included in the list "Trusted", you must use a universal recovery key.

You should have written it down at the stage of enabling two-factor authentication.

The universal key is displayed in your account settings. If you have not logged out of your account, you can view it in the tab "Settings"-"Safety".

If you managed to log out of your account, restore access to your Apple ID Apple support will help.

Write your appeal with a detailed description of what happened and wait for a response. Link: https://support.apple.com/ru-ru.

The message with the code does not arrive - solution

In most cases, problems with receiving verification codes arise due to isolated failures in the OS. Not receiving a notification with numbers to confirm authentication?

Try sending the code again or restart both devices.

Another case– the message arrived on a trusted device, but it was not displayed in the notification center. Check your inbox, the numbers you need should be there. The sender of the letter is Apple.

As a reset option, you can delete the email chain from Apple and resend the authentication message.

Perhaps the memory allocated for storing one bunch of letters has run out.

The program does not support verification code - what should I do?

Not all programs have a built-in ability to work with verification codes. You can configure this function yourself in your profile.

Log into your account using a browser and set a password for logging into third-party programs yourself.

Costume codes will be known only to you. Use them to log into all services that use an Apple ID profile - iCloud cloud, standard email client, calendar, utility "Notes" and other software.

Follow the instructions:

  • Sign in to your Apple ID using your browser. Use the address https://appleid.apple.com/#!&page=signin ;
  • After logging into your account, find the field "Safety" and click on the button "Change";
  • In the new window, click on "Create a password". Next, select a program or set of applications to which the specified digital code will be applied. Save your settings. Now, when you try to log into the program, you will need to enter the specified numbers.

Error: “Enable verification will be available later”

If you encounter this system message when trying to activate multi-level authentication, it means that you will not be able to configure the option in the near future.

This only happens in two cases - after you recently changed the password for your Apple ID account or as a result of adding a new security question.

The user cannot change the password and set up verification at the same time, since the Apple system regards these actions as a possible attempt by an attacker to access your account.

The setup error message indicates the date from which you can begin creating multi-level authentication.

A notification of this will be sent to the email associated with the ID.

Thematic videos

It is known that Apple devices allow two-step authorization. This security method performs at least two authentication checks - a password and a trusted device - to access an account.

Two-step, or as it is also called, two-factor authentication (2FA), provides reliable data protection, since its passage requires not only knowledge of the password, but also physical access to one of the keys, in our case it is an iPhone or iPad.

Needless to say, we highly recommend using it on any account you can. Moreover, if a service does not support 2FA, you should think twice before using it if the security of your data is important to you.

If two-step verification is enabled on your Apple ID (which you should probably do), then you've most likely encountered a window asking you to confirm that you are the owner of the account. This screen should list some of your Apple devices and at least one verified phone number. These devices act as access keys.

Have you ever wondered what requirements the devices on the list must meet? Or maybe you needed to add or remove a device from this list? In this tutorial we will talk about managing trusted devices for 2FA.

How to add a trusted device

To add a device as one of your authentication keys, you simply turn on Find My iPhone on your iPhone, iPad, or iPod Touch. As soon as you enable the function, the device will automatically be added to the trusted list. You will then need to confirm adding this device.

Step 1: Log in to iCloud and enable Find My iPhone on the device you want to trust in Settings > iCloud.

Step 2: Sign in to My Apple ID, go to Password & Security >

Step 4: A four-digit verification code will be sent to this device.

Enter this code in the field that appears in Safari and click Verify device.

Now you can verify that the device is verified as trusted. Now, whenever you need to use two-step authentication to log in to your Apple ID, you can use this device as a key.

How to remove a trusted device

Not surprisingly, devices can also be removed from the trusted list. When you sign out of iCloud or turn off Find My iPhone, your device is no longer trusted, but is still listed as possibly trusted.

Step 1: Turn off Find My iPhone.

Step 2: In Safari, sign in with My Apple ID and go to Password & Security > Add or Remove a Trusted Device.

To have access to Apple services, each user must register an account, which is commonly called an Apple ID. Like any other account, this one also consists of a login and password. An email address is used as a login, which users “shine” always and everywhere, so it is not difficult to recognize it. Given the large range of programs for selecting and cracking passwords, it is possible to gain access to Apple ID today. Apple understands this, which is why they offer users the protection that is relevant today - two-step authentication. True, this requires a special code, and many users simply do not know where to enter the Apple ID verification code.

By the way, Apple offers two-step verification for iOS 8 (and earlier) users, and for those luckier (iOS 9 and older), two-step verification. You should still know where to enter the Apple ID verification code, because both methods are similar to each other.

What is two-step verification?

This is additional protection, thanks to which no one will gain access to the Apple ID even if he knows the login/password pair. To access it you will still need a specific set of numbers, which he will not have.

If you don't know where to enter your Apple ID verification code, see the following instructions.

  1. Go to the official website appleid.apple.com. Enter your login and password, secret code.
  2. We study the information about the verification that is issued automatically. Next, click “Continue”. It may happen that information about two-step verification will not be displayed. You can find it in the section "Edit - Security - Configure - Two-step verification."
  3. In the next window you must enter your phone number. It will receive codes via SMS to complete the verification. It is not necessary to choose your phone number. You can indicate the number of your parents, wife, etc.
  4. On the next page you need to check the phone number you specified. You should receive a code via SMS. Enter it in the window that appears. If it is not there, then click on the “Resend code” button.
  5. After entering the code, the program will prompt you to select auxiliary gadgets to receive a verification code. Here you can specify additional trusted smartphones. Each trusted smartphone will have to be confirmed via SMS.
  6. After confirmation, you will see the recovery key. It is complex and unchangeable. It needs to be kept in a safe place - it will be used if you suddenly forget the password to your Apple ID account or simply lose your trusted smartphone.
  7. In the next window you will have to enter the recovery code again. This may seem strange to some, but it's normal. This step focuses the user's attention on the importance of the key. Enter the code from the sheet without copying it programmatically.
  8. Lastly, we accept the verification conditions.

That's it. The check is activated. Now, when you try to sign in to your Apple ID account, you will need an Apple ID verification code. You now know where to enter it. The attacker also knows, but he will not be able to log into the account, because he simply does not have a trusted smartphone.

By the way, it is best to indicate a trusted phone number not of your own, but of a close relative. If suddenly someone steals your iPhone, they can easily log into your Apple ID, because the verification code will be on the same phone.

Two-Step Verification

There is no practical difference between verification and authentication. At least the user won't notice them. In both cases, you need to know where to enter the Apple ID verification code. In both cases, an SMS with a verification code is sent to the phone, after specifying which access to the account is granted.

Authentication is enabled in the settings. There is a menu item "Password and...". Authentication may also be available in iCloud settings, in the Apple ID tab - “Password and Security”. Click on "Enable". The protection will be enabled, but not yet activated.

Now we need to configure authentication. We enter a trusted number, wait for the code, and confirm the smartphone. Now the protection is activated, next you need to figure out where to enter the Apple ID verification code. When logging into any Apple service, you will need to provide a login and password. And then the code will be sent via SMS. It must be entered after the login/password pair.

What is the difference?

It’s easy to see that there are practically no differences between two-step verification and authentication. Both require an Apple ID verification code to sign in, so what's the difference?

Apple claims that two-factor authentication is more reliable and modern security. And although the user does not see the difference, the authentication system more effectively verifies devices and sends verification codes. Overall the optimization is much better.

Now you know where to enter your Apple ID verification code. But first, the protection must be turned on.

Conclusion

I highly recommend using this protection. Regardless of what operating system you have (old or new), use two-step authentication or verification, as this protection negates any efforts of thieves to find out access to your account. Well, if you don’t know where to enter the Apple ID verification code, then there will be no problems with this, because the user interface is so simple that even a child can figure it out.