Two-step verification, also called "two-factor authentication" or "2FA", increases the security of your account by requiring two steps — your password plus an additional security step — in order to log in to your account.
We support two-step verification with either an app on your phone or a dedicated security device that plugs into your computer. SMS can also be used as a backup mechanism.
It is not required to have 2FA set up on your Fastmail account, but it is recommended if you want additional security.
- Why should I use two-step verification?
- How to set up two-step verification
- How to log in with two-step verification
- Using two-step verification with a mail client
- Why do I have to add a recovery phone number to set up two-step verification?
- Which two-step verification method should I use?
- How do authenticator apps and security keys work?
- Fastmail security principles
Why should I use two-step verification?
In an ideal world, all passwords would be a secret. But the more a password is used, the more exposed it becomes to malicious attackers. They might try to steal it (through phishing or malware/spyware), or guess it (through brute force repeated dictionary attacks).
With two-step verification, if someone does manage to steal your password, they still can't use it to log in to your account without your verification device.
How to set up two-step verification
General setup instructions
- Open the Settings → Privacy & Security screen.
- If this is your first time enabling two-step verification for this account, you must add a recovery phone to your account (see "Account recovery credentials" below).
- If you have a recovery phone on your account, find the Password & Two-step verification section and click Manage two-step verification.
- Click Add verification device.
- A Verify it's you box may appear. Enter your password and click Continue. (For more information, see our Password-protected actions help page.)
- Select which kind of verification device you're adding to your account. Skip to the "Authenticator app (TOTP)" or "Security keys and Yubico OTP" instructions below for instructions on adding your verification device. If you have an older YubiKey without support for modern security standards (U2F/Webauthn), you can click Set up Yubico OTP at the bottom of the screen.
Account recovery credentials
To help make sure that you are not locked out of your own account, before you can enable two-step verification, you must add a recovery phone to your account. If you ever lose access to your primary form of two-step verification, your recovery phone can be used to prevent you from being locked out of your account. You get a code sent to your phone instead to complete your second step when you log in.
- Go to the Settings → Privacy & Security screen, then find the Account recovery section and click Add recovery options.
- Click the Add recovery phone button.
- A Verify it's you box will appear. Enter your password and click Continue. (For more information, see our Password-protected actions help page.)
- Enter your phone number and click Send verification code. Clicking this button will send a verification code to your recovery phone.
- Once you've received your verification code, enter the code and click Verify. This will add your recovery phone to your account.
- A confirmation screen will appear. Click Done to return to the Privacy & Security screen.
On the Account Recovery screen, you can also see your recovery code, which is randomly generated for your account. If you forget your password or lose your security device, you can use the recovery code as part of the recovery process to reset your password and restore access to your account. We strongly recommend writing down or printing out your recovery code and keeping it somewhere safe.
Authenticator app (TOTP)
- Once you've installed the authenticator app on your phone or tablet, select to add a new account.
- Use your device's camera to scan the QR code on the screen (or manually type in the key on the screen into the authenticator app). If you're setting up an OTP device, select "Set a custom key" and enter the key that came with your device.
- Enter the 6-digit code the app gives you into the Fastmail web interface.
- Name this device so you can keep track of your verification devices and remove them if needed in the future.
Security keys and Yubico OTP
- Insert the device into the USB port on your computer.
- Touch the button on the device once it lights up.
- Name this device so you can keep track of your verification devices and remove them if needed in the future.
How to log in with two-step verification
Start by navigating to our login page, then:
- Enter your username and your password. Click Log In.
- Enter the current verification code from your authenticator app or OTP device, or plug in your security key and touch the button if it has one. If you have more than one two-step method on your account, click Verify another way to switch to another method.
- You can also declare this computer as trusted which means you don't need to use two-step verification again when logging in on that computer.
If you use 1Password to manage your passwords, we have instructions on using 1Password with Fastmail at our Using 1Password on Fastmail web interface help page.
If you'd like to revoke a computer's trusted status, you can also do that on the Privacy & Security screen. The next time you log in on that device, you will need to re-authenticate using your 2FA.
Using two-step verification with a mail client
Other than the Fastmail app, most mail and calendaring computer programs and phone/tablet apps don't support two-step verification.
You'll need to set up app passwords for each device instead.
Why do I have to add a recovery phone number to set up two-step verification?
Keeping your account safe from attackers is very important, but so is making sure you don't get locked out of your own account. Requiring a phone as a backup option balances security (no one else can read your data) and availability (you can read your data). For most users, the risk of losing their two-step verification device is far greater than the risk of someone hacking their SMS. If you lose your phone, the TOTP key is lost, but normally you can get a new SIM card with the same number from your carrier.
Please note, if two-step verification is enabled, access to the phone number itself is not sufficient to gain access to an account: you still need two factors (your password AND the SMS).
Users who accept the risk of being locked out of their account may remove the recovery phone number from their account after two-step verification has been enabled. Once the phone number is removed from the account, SMS is no longer an option as the second factor for verification. If you choose to do this, we strongly recommend you write down or print your recovery code and store it in a safe location, and that you set up at least two security keys or authenticator devices. Should you lose access to all two-step verification devices and do not have your recovery code, you may be permanently locked out of your own account.
Which two-step verification method should I use?
Note: You can set up more than one two-step verification device on your account.
Authenticator app (TOTP)
With this option, you can install an app on your device (usually your phone) that will generate a random 2FA code that you can enter when logging in to your account. There are free authenticator apps that can be used. If you're new to using 2FA, using an authenticator app would generally be the easiest method.
Not sure which authenticator app to use? We recommend:
- iPhone: Google Authenticator, Authy, or Duo Mobile
- Android: Google Authenticator, Authy, or Duo Mobile
If you have a different phone, you may still be able to use TOTP. Any app supporting Time-based One-Time Password (TOTP) from the Initiative for Open Authentication (OATH) as specified in RFC 6238 should work.
Note: Neither the Google Authenticator app nor our server implementation is specific to Google in any way, nor does it ever communicate with Google systems as part of its operation (or with any other system). "Google Authenticator" is the name of Google's TOTP app, which has become synonymous with the authentication method itself.
Security keys and Yubico OTP
Both security keys and Yubico OTP require the use of a hardware device during login, rather than entering a code. For security keys, they are domain specific. This would be the most secure option as it protects you against phishing. For Yubico OTP, please note that it is a legacy security key format. There is no reason to use this unless you have an old key that does not support WebAuthn/U2F authentication.
U2F is an older form of authentication that has been superseded by WebAuthn. We only support WebAuthn entries. However, WebAuthn works with U2F-compatible security keys, which means that if you have a U2F key, you can still use it in Fastmail. Any security key that supports WebAuthn or U2F should work. We do recommend newer YubiKey devices that support WebAuthn/U2F, as in our experience these have the best build quality, a slim profile, and are reliable. You can buy one from Yubico, or Yubico's Amazon store.
Security device: OTP
This requires the use of a hardware device, but does not require a mobile device or USB port. A code needs to be entered in during login. This method is useful if you can't use an authenticator app and can't plug a device into a computer.
Many manufacturers are now selling standalone OTP devices, often in a credit card or key fob form-factor. We've tested with Feitian c200 devices, but any device implementing the TOTP standard should work. We support devices with HEX or BASE32-encoded keys with a 30- or 60-second time step. If your particular device doesn't work, please let us know the make and model of the device and we'll look into adding support for it.
When adding these devices to your account, use the Authenticator App (TOTP) option. This is because OTP devices use the same mechanism (TOTP) as authenticator apps described above.
SMS code
This method involves a code being sent to your phone via text message, and the code will need to be entered in during login. It does not require additional charges and is free.
Note: SMS can be used as a backup mechanism in case you lose your security device. This can only be used if you already have two-step verification enabled through an authenticator app or security device.
How do authenticator apps and security keys work?
Interested in what's happening under the hood to keep you safe? Learn more about how TOTP works, how U2F works, or how YubiKey OTP works.
Fastmail security principles
We take security seriously at Fastmail and design our systems to improve the confidentiality, availability, and integrity of our customers' data. The user login process and account recovery process are a particularly important part of our security.
When you turn on two-step verification, we understand that you value the confidentiality of your account more highly and take extra steps to ensure that. If you lose access to your account when you have two-step verification enabled, the recovery process still requires two independent factors. If a recovery attempt is successful, we delay the final recovery step for 24 hours. In this time, we notify the account owner via email and give them the opportunity to cancel the recovery if they weren't the person who requested it.
For more information on how we designed our security system, see our blog post about the design and thought process.