
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 11 Apr 2026 08:50:08 GMT</lastBuildDate>
        <item>
            <title><![CDATA[You can now use Google Authenticator and any TOTP app for Two-Factor Authentication]]></title>
            <link>https://blog.cloudflare.com/you-can-now-use-google-authenticator/</link>
            <pubDate>Thu, 16 Feb 2017 21:52:49 GMT</pubDate>
            <description><![CDATA[ Since the very beginning, Cloudflare has offered two-factor authentication with Authy, and starting today we are expanding your options to keep your account safe with Google Authenticator and any Time-based One Time Password (TOTP) app of your choice. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Since the very beginning, Cloudflare has offered <a href="/choosing-a-two-factor-authentication-system/">two-factor authentication with Authy</a>, and starting today we are expanding your options to keep your account safe with Google Authenticator and any Time-based One Time Password (TOTP) app of your choice.</p><p>If you want to get started right away, <a href="https://www.cloudflare.com/a/account/my-account">visit your account settings</a>. Setting up Two-Factor with Google Authenticator or with any TOTP app is easy - just use the app to scan the barcode you see in the Cloudflare dashboard, enter the code the app returns, and you’re good to go.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Zx79zxgeaggLrqgyfoILY/49d4594bad96d6a5a57825b5b264561b/IMG_3701_5.png" />
            
            </figure>
    <div>
      <h3>Importance of Two-Factor Authentication</h3>
      <a href="#importance-of-two-factor-authentication">
        
      </a>
    </div>
    <p>Often when you hear that an account was ‘hacked’, it really means that the password was stolen.</p><blockquote><p>If the media stopped saying 'hacking' and instead said 'figured out their password', people would take password security more seriously.</p><p>— Khalil Sehnaoui (@sehnaoui) <a href="https://twitter.com/sehnaoui/status/816861012016197632">January 5, 2017</a></p></blockquote><p>Two-Factor authentication is sometimes thought of as something that should be used to protect <i>important</i> accounts, but the best practice is to always enable it when it is available. Without a second factor, any mishap involving your password can lead to a compromise. Journalist Mat Honan’s <a href="https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/">high profile compromise</a> in 2012 is a great example of the importance of two-factor authentication. When he later <a href="https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/">wrote about the incident</a> he said, "Had I used two-factor authentication for my Google account, it’s possible that none of this would have happened."</p>
    <div>
      <h3>What is a TOTP app?</h3>
      <a href="#what-is-a-totp-app">
        
      </a>
    </div>
    <p><a href="https://tools.ietf.org/html/rfc6238">TOTP (Time-based One Time Password)</a> is the mechanism that Google Authenticator, Authy and other two-factor authentication apps use to generate short-lived authentication codes. <a href="/choosing-a-two-factor-authentication-system">We’ve written previously on the blog</a> about how TOTP works.</p><p>We didn’t want to limit you to only using two-factor providers that we'd built integrations with, so we built an open TOTP integration in the Cloudflare dashboard, allowing you to set up two-factor with any app that implements TOTP. That means you can choose from a wide array of apps for logging into Cloudflare securely with two-factor such as <a href="https://m.vip.symantec.com/home.v">Symantec</a>, <a href="https://duo.com/product/trusted-users/two-factor-authentication/duo-mobile">Duo Mobile</a> and <a href="https://support.1password.com/guides/ios/?q=totp">1Password</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NRvcimd3ivJwDuKgGRIOC/600caf42c23fcb0c9921fc19a759b003/Screen-Shot-2017-02-15-at-3.59.18-PM_5.png" />
            
            </figure>
    <div>
      <h3>Get Started</h3>
      <a href="#get-started">
        
      </a>
    </div>
    <p>If you want to enable Two-Factor Authentication with Google Authenticator or any other TOTP provider, visit <a href="https://cloudflare.com/a/account/my-account">your account settings here</a>. It’s easy to set up and the best way to secure your account. We also have step by step instructions for you <a href="https://support.cloudflare.com/hc/en-us/articles/200167866">in our knowledge base</a>.</p> ]]></content:encoded>
            <category><![CDATA[Google]]></category>
            <category><![CDATA[Authy]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">7tfSOTb7M9IB9n4KkDOsv0</guid>
            <dc:creator>Evan Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Choosing a Two-Factor Authentication System]]></title>
            <link>https://blog.cloudflare.com/choosing-a-two-factor-authentication-system/</link>
            <pubDate>Wed, 28 Nov 2012 20:21:00 GMT</pubDate>
            <description><![CDATA[ We've been thinking about how to best implement two-factor authentication to better protect our customers' accounts for quite some time now. When, about 6 months ago, my account was targeted by hackers the importance of a good account security became clear.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We've been thinking about how to best implement two-factor authentication to better protect our customers' accounts for quite some time now. When, about 6 months ago, my account was <a href="/post-mortem-todays-attack-apparent-google-app">targeted by hackers</a> the importance of a good account security became clear. However, as my hacking case illustrates, two-factor authentication alone is not a complete answer.</p><p>At CloudFlare, we considered a number of different ways to implement two-factor authentication. We considered building it ourselves and using Twilio, or another similar service, to send authentication codes via SMS to our customers' mobile phones. The problem with that strategy is that it passes the supposedly secure authentication code through your mobile carrier's less-than-secure network. And, again, if there's a lesson to be learned from my own hacking case it's that mobile providers' security is not always the most robust.</p><p>We also considered some sort of fob-based two-factor system. Unfortunately, these are generally very expensive and therefore prohibitive for us to offer all our customers. We also considered solutions like Google's Authenticator. It's a well thought out system, and we have a ton of respect for the Google team, but we were nervous about handing another key to identity over to a company whose primary business is search and advertising. Not to mention a bit of a bad taste after a <a href="/the-four-critical-security-flaws-that-resulte">flaw in Google's own implementation of their two-factor authentication system</a> contributed to my hack.</p>
    <div>
      <h3>TOTP: Open Authentication</h3>
      <a href="#totp-open-authentication">
        
      </a>
    </div>
    <p>The underlying algorithm used by several two-factor authentication schemes, including Google's, is open and known as the <a href="http://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">Time-based One-time Password Algorithm (TOTP)</a>. TOTP was specified by the Internet Engineering Task Force (IETF) under <a href="http://tools.ietf.org/html/rfc6238">RFC 6238</a>.</p><p>The mechanics of TOTP are relatively easy to understand. To begin, every TOTP user is issued a random key. Both the server and the client has a copy of this random key. TOTP assumes that both the server and the client can synchronize their clocks. When a user goes to login, the client takes the current timestamp to the previous 30-second interval. The client then combines the key and the timestamp.</p><p>This combined key and timestamp value is then run through a SHA hashing algorithm. SHA, like other cryptographic hashes, is a one-way algorithm. That the output cannot be used to derive the input. The SHA algorithm's output becomes the authentication code which the user can post to the server as part of the login process.</p><p>Since the server has the same random key for the user, and since the client and server clocks are synchronized, the server can also calculate an authentication code using the SHA algorithm. If the authentication code the server has received from the user matches the one the server derived itself then the user's identity can be confirmed.</p><p>What is powerful about this scheme is that if an attacker steals the authorization code then, within 30 seconds, it will be useless. This is typically insufficient time for the attacker to gain access to the account. This is particularly effective against phishing attacks, where an attacker convinces a user to reveal their login credentials on a fake website.</p>
    <div>
      <h3>Authy</h3>
      <a href="#authy">
        
      </a>
    </div>
    <p>If the core algorithm for two-factor authentication is public, then the question comes down to who has the best implementation. We looked at several implementations and were particularly impressed by a company called <a href="http://www.authy.com/">Authy</a>. The Authy team created a beautiful, simple, elegant app that implements TOTP. Their vision is not to create yet another app you need to install, but instead to create a single place from which you can manage all your TOTP two-factor authentication tokens.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2HS99JoAaKJ5jgJjQZTV5u/bc95bca549bacf91bdc92acfd09ce79e/authy_logo.png.scaled500.png" />
            
            </figure><p>We've been using the Authy app internally for all of our administrative systems for the last three months. The Authy team has worked with us to refine their app to make it as simple and elegant as possible. After months of our own tests, and spurred on by a phishing attack that targeted CloudFlare accounts, we decided to open up two-factor authentication as a feature for all our customers. If you're interested, you can read about how to implement it on your account with <a href="/2-factor-authentication-now-available">just a few easy steps</a>.</p>
    <div>
      <h3>But... I've Already Installed Google Authenticator on My Phone!</h3>
      <a href="#but-ive-already-installed-google-authenticator-on-my-phone">
        
      </a>
    </div>
    <p>The biggest question we continue to get is why we didn't just use Google Authenticator, since a number of people already have it installed on their phones. Beyond the high-level concerns above, there were a number of technical concerns over security and ease of use that we believe made Authy a better choice.</p><p>First, with Google Authenticator if you lose your app there's no way you can revoke the app's tokens. This is probably the biggest security flaw with the Google Authenticator app. While it can be mitigated by password protecting your phone, the better solution is to allow the app to be deauthorized. Authy fixes this problem and allows you to revoke the app's token if you lose your phone. That's a big win for Authy over Google Authenticator.</p><p>Second, Google's Authenticator can get out of sync when you don't have network access, leaving you in the frustrating situation of not being able to access your account. Since all TOTP systems rely on the clock on your phone to match the clock on the server, if there's not a fairly precise match then there can be problems. I've experienced this myself when traveling and it can be frustrating. Authy has built a significant amount of logic into their app in order to keep clocks in sync even when you don't have network access.</p><p>Third, if you upgrade your phone, with Google's Authenticator you have to reestablish all your two-factor accounts from scratch. With Authy, all your accounts are synced, so when you upgrade and re-install Authy everything will be setup the way you expect it.</p><p>And there are a number of other well thought out details. Authy uses SHA-2 and 256-bit keys, where Google's Authenticator uses SHA-1 and 128-bit keys — likely not a huge deal for this application, but generally longer keys and more secure hashing protocols are better. When you wake your phone from sleep, Authy will always start with a code good for the next 30 seconds — it's a nice touch and removes the annoyance with Google's Authenticator of having to wait for the timer to expire if you don't have enough time to enter a code. And the interface is cleaner and just nicer to use than Google's.</p><p>But we get it. People don't like to have to install another app on their phones. The good news is the Authy team gets it too. They're adding support in the next few weeks for Google Authenticator tokens to their system as well. That way you can use Authy's great UI to access your Google codes through one app.</p> ]]></content:encoded>
            <category><![CDATA[Authy]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">Lbs4T8aubqbyCAvuxfBbt</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Two-factor Authentication Now Available]]></title>
            <link>https://blog.cloudflare.com/2-factor-authentication-now-available/</link>
            <pubDate>Wed, 28 Nov 2012 17:05:00 GMT</pubDate>
            <description><![CDATA[ With web performance and security being the core of CloudFlare, we are always looking for ways to improve not just our customers' website security, but their account security as well. Therefore, we are excited to now offer two-factor authentication for all CloudFlare accounts. ]]></description>
            <content:encoded><![CDATA[ <p>With web performance and security being the core of CloudFlare, we are always looking for ways to improve not just our customers' <a href="https://www.cloudflare.com/learning/security/how-to-secure-a-website/">website security</a>, but their account security as well. Therefore, we are excited to now offer two-factor authentication for all CloudFlare accounts.</p><p>With two-factor authentication, our customers' accounts get an added layer of login security, ultimately adding another layer of <a href="https://www.cloudflare.com/security/">security to their websites</a>. We've been working on this feature for a while, and we are happy to announce that it's ready and available to all CloudFlare customers.</p><p>To make this feature happen, we worked with <a href="https://www.authy.com/">Authy</a>, a startup who loves security too. Authy provides an easy-to-use, powerful two-factor authentication service. Their mission is to turn everyone's cell phone into a secure token. The Authy app works with iOS and Android devices and we're providing it free to all CloudFlare account holders. Here's how it works.</p>
    <div>
      <h3>Easy additional account security</h3>
      <a href="#easy-additional-account-security">
        
      </a>
    </div>
    <p>To turn two-factor authentication on, you simply log into your CloudFlare account, navigate to "<a href="https://www.cloudflare.com/my-account">My account</a>" and select "two-factor authentication with Authy."</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1rxVabRs2TtqUdWIOOotuz/3cef430aeab13801e8634e3d6f19f46a/Screen20shot202012-11-2020at2012.22.1420PM.png.scaled500.png" />
            
            </figure><p>Once there, you will enter your mobile phone information and select "enable two-factor authentication."</p><p>You will then receive a text message (your provider's standard text messaging rates will apply). The text message includes a link to download the Authy app. The Authy app will ask you to enter your your mobile phone number. It will then text you a setup pin that you need to enter into the Authy app.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6rVEGU55uA7P4kJkL3ysB1/3163a981885abf554367d0e601588c80/authy-install-link.png.scaled500.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1z4RxEstqDg079BQwIJAtA/d9284d4c61e976344aed21cd0819f871/authy-registration_copy.png.scaled500.png" />
            
            </figure><p>Once you receive your pin number via text, enter it into the Authy app. The Authy app will then be authorized and able to generate authentication tokens unique to your account. In the future, whenever you access your CloudFlare account you'll need three things: 1) your email address, 2) your password, and 3) your two-factor authentication token.</p><p>When you <a href="https://www.cloudflare.com/login">login to CloudFlare</a> for the first time after enabling two-factor authentication, you will need to launch the Authy app on your phone. It will generate a unique, 7-digit authentication token. The authentication token is good for 30 seconds and then will change to a new token.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/318ViNLBHqlbUcEubhUZwm/23fd7868f6541b7c26402451a7ff9855/cloudflare-token.png.scaled500.png" />
            
            </figure><p>You can store your authentication for 14 days. If you login from an unrecognized device, or after your authentication expires, you'll need to open the Authy app and get your new authentication token for that device. The Authy app does not rely on you having network access, so you can retrieve your code even if your phone is not connected to the Internet.</p><p>If you ever lose your phone or get a new one you can reassociate your account by following the <a href="https://www.authy.com/phones/reset">reset instructions</a> on Authy's website.</p><p>You don't need to enable two-factor authentication in order to continue to use CloudFlare. However, we're providing it to all CloudFlare customers free and we recommend it for everyone who wants additional account security.</p> ]]></content:encoded>
            <category><![CDATA[Authy]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5TPSqzl5wgpMJ9wXuBNkkp</guid>
            <dc:creator>Kristin Tarr</dc:creator>
        </item>
    </channel>
</rss>