Home / Mac / Apple requires two-factor authentication for developer accounts

Apple requires two-factor authentication for developer accounts

In an effort to secure developer accounts from counterfeit actors, Apple said Wednesday all App makers will be asked to use the company's two-factor authentication protocol to protect their Apple IDs.

Apple's Two Factor Authentication System on iOS.

The change, which comes into effect on February 27, is designed to keep developer accounts safer by ensuring that only account owners can access sensitive information, Apple said in an email.

When backend implementation continues, developers who do not already have two-factor authentication enabled will be required to log in to their Apple Developer account. Improved security also applies to the developer's certificates, identifiers and profiles.

Apple Letter to Developers:

In an effort to safeguard your account, two factor authentication is required to sign in to your Apple Developer account and certificates, identifiers and profiles from February 27, 2019. This additional security layer for your Apple -ID, ensures that you are the only person who can access your account. If you haven't already enabled two-factor authentication for your Apple ID, learn more and update your security settings.

The email contains links to a support page covering the Apple ID's Factor Authentication, as well as a contact form targeting Apple Developer Relations.

Tofactor authentication for developers is identical to the solution deployed for consumers running Mac and iOS devices. After enabling the feature on macOS or iOS, each Apple ID logon attempt on an unregistered device requires both a password and a six-digit code generated by Apple and sent to a trusted iPhone, iPad, or Mac. Apple does not require a verification code when you open Apple ID from a trusted device, but that status will be revoked if a user logs out completely or deletes the device.

Although not foolproof, the two factor authentication significantly increases account security, thereby reducing the possibility of unauthorized access from an external party.

Source link