Amazon.co.uk Widgets

Log in

X
Why You Should Switch from MS Authenticator to Authy Today

Digital security is so important today to your digital well-being today. Transitioning from one two-factor authentication (2FA) application is a royal pain in the ass, but necessary for Microsoft Authentictor users. This article explores why you need to switch from Microsoft Authenticator to Authy, an alternative that offers synchronisation across multiple devices added functionalities and a roadmap not a sunset. We will address the steps for a smooth transition, and discuss both the benefits and potential concerns associated with using Authy.

TL:DR – The switch from Microsoft Authenticator to Authy is straightforward, involving the temporary disabling of 2FA on your accounts, re-enabling it with Authy, and understanding how to manage device synchronisation. You need to move because Microsoft Authenticator is going away. Act now, before its too late and you are in a world of pain. "After August 2025, your saved passwords will no longer be accessible in Authenticator and any generated passwords not saved will be deleted" - Microsoft web site.

Understanding two-factor authentication (2FA)

Two-factor authentication (2FA) is a security measure that requires two forms of verification before granting access to an account. Typically, this involves something you know, such as a password, and something you have, such as a mobile device with an authentication app.

Common applications for 2FA include Microsoft Authenticator, Google Authenticator, and Authy. Each app functions by generating time-sensitive codes, which users must input when accessing secure accounts, ensuring that even if a password becomes compromised, unauthorised access remains blocked. These applications all use the same standard mechanism to do this.

The importance of 2FA cannot be understated, with statistics from recent studies indicating that users who employ 2FA are considerably less likely to experience hacking incidents. According to the Cyber Security & Information Systems Information Analysis Center, effective 2FA implementation hinders around 99.9% of automated attacks, showcasing its necessity for users concerned about the safety of personal and professional data.

Number one reason for switching from Microsoft authenticator to Authy

Microsoft Authenticator has been a popular choice, especially for users within the Microsoft ecosystem. However, transitioning to Authy is now forced upon users because of its imminent discontinuation.

Further benefits of Authy over other 2FA systems

Authy has enhanced features compared to Microsoft Authenticator and Google Auth anyway, such as cloud backups, multi-device synchronisation, and a user-friendly interface, so the end result is a better, more robust solution. This feature can be particularly beneficial for users who frequently switch devices or for those who rely on multiple devices for work.

Another reason for switching stems from the backup functionalities inherent within Authy. Users can secure their 2FA tokens in the cloud, providing an additional layer of safety in the event of device loss or failure. In contrast, Microsoft Authenticator lacks a comprehensive cloud backup option, and in any case is being discontinued.

Authy's user interface is more streamlined and intuitive, allowing preselected or custom icons to be associated with 2FA accounts and facilitating ease of use even for individuals less familiar with 2FA applications.

Users transitioning to Authy will find they have an enhanced overall experience when managing their two-factor authentication needs.

How to switch from Microsoft authenticator to Authy

The process of switching from Microsoft Authenticator to Authy may initially appear intricate, but following straightforward steps can ensure a seamless transition.

  1. Download and install the Authy application on your main phone. Upon installation, create an Authy account using the same phone number linked to your existing 2FA applications. Optionally, download Authy on a second phone and link it by enabling multi device access on the first phone and sending a code to the first phone to be entered into the second phone. If you do this you now have an authenticaiton system sharing the same codes, on two devices, backed up in the cloud. Pretty neat!
  2. The next step is to assess and document all accounts that currently employ 2FA through Microsoft Authenticator. This will enable users to effectively re-enable 2FA using Authy after temporarily disabling it on their accounts.
  3. Once the accounts are identified, perhaps old school on a piece of paper, begin by signing into each service, that uses two-factor authentication via Microsoft Authenticator.
  4. For each account
    1. Access the security settings of each account and temporarily disable 2FA or re-enroll 2FA depending on the flow of the system
    2. Enable 2FA once again, this time configuring it with Authy.
    3. At this point, you will scan a QR code or enter a code provided by the service to complete the integration, ensuring it is now linked to your Authy app.
    4. Optionally customise the icons and colour to help quick reconition of the service you are using
    5. Test that the sign in works with Authy.
  5. Repeat the steps for every account you have with 2FA
  6. Now you can delete Microsoft authenticator.

Managing multiple devices with authy

Authy optionally synchronises 2FA codes across multiple devices, enhancing user convenience. To initiate synchronisation, users must enable the 'Allow Multi-device' function within the Authy settings on their primary device. This feature permits the addition of other devices by entering a unique code provided by Authy during the authentication process.

Once multi-device settings are enabled, the user can install the Authy app on their secondary device and log in using the same phone number. Assure that the secondary device is verified before completing the set-up process. Following verification, the 2FA codes configured on the primary device will automatically synchronise to the secondary device.

After synchronization is complete, for added security, users are encouraged to disable the 'Allow Multi-device' setting on their primary device. This will prevent any additional unauthorised devices from linking to the Authy account, thereby maintaining the integrity of the stored authentication tokens.

Security and privacy considerations

While Authy's features provide significant advantages, it is essential to consider the security implications of using cloud-based 2FA services. Storing authentication codes in the cloud raises potential privacy risks, particularly if sensitive data is involved. Users must be vigilant regarding the security of the email and phone numbers associated with their accounts, as these could potentially be targeted by malicious actors.

Alternatives to Authy

While Authy implements extensive security measures, including encryption, users who prioritise absolute security may seek alternative systems that offer greater control over their codes. Some may prefer offline authenticator apps that do not rely on the cloud or multi-device functionality. It is advised to weigh the convenience of digital synchronisation against the potential security trade-offs, tailoring preferences to individual security needs.

The most secure minded of all might prefer to use a physical security key such as a Yubikey - these physical devices work in the same way really as a physical token for 2FA, you have to plug them in or connect them via NFC to your device and they provide the code to the system that fulfils the second factor. Ultimately, while the use of Authy is suitable for many if not all users, some users may require this additional layer of protection, to further safeguard against unauthorised access. You'd need to enroll more than one key and buy more than one key if the system allows it, in order to get close to the multi device capability in Authy.

Yubikey
YubiKey 5C NFC - Two-factor authentication (2FA) security key, connect via USB-C or NFC, FIDO certified - Protect your online accounts
  • Trusted – Yubico's security keys are trusted by individuals, businesses, and governments worldwide for strong protection against phishing, account takeovers, and other cyber threats.
  • Durable – Built to last with glass-fiber reinforced plastic. IP68 rated (water and dust resistant), crush resistant, no batteries required, no moving parts.
  • User-friendly – Yubico's security keys are designed with simplicity in mind, with intuitive setup processes and convenient form factors for on-the-go use. Just tap to go.
  • A good selection of Yubikeys are available on Amazon - choose the one with the right connectors for your main computer.

Conclusion

Transitioning from Microsoft Authenticator to Authy allows users to take advantage of enhanced 2FA capabilities, including device synchronisation and cloud backup services. This switch can simplify access to account codes across multiple platforms while fostering a more cohesive approach to digital security. The outlined steps for switching applications illuminate a straightforward path for users wishing to make this transition.

Carefully considering both the advantages and potential security implications of using Authy is essential to optimising your two-factor authentication experience. If an authenticator app is not enough, consider a physical security key such as a Yubikey. Staying informed, employing best practices, and consistently evaluating personal security needs will not only improve your 2FA setup but will also contribute significantly to safeguarding your digital life.