How to Retrieve and Generate Google 2FA Backup Codes (2024)

Topic — Security

Published

Written By Andy Wolber

We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not the content of our reviews. See our Terms of Use for details.

Learn how to retrieve your Google 2FA backup codes and how best to use them.

Two-factor authentication via SMS, which can be intercepted, can be a less-than-ideal security measure. Yet, some systems, such as banks, don’t support interaction with apps like Authy or Google Authenticator and insist on sending 2FA codes via SMS. For the more security-minded, this isn’t really a good option.

Fortunately, some services offer 2FA backup codes that can be used instead. Google is one such service. When you set up 2FA for Google, you are given the option to generate backup codes. You can use these codes instead of SMS 2FA. These backup codes work, and when you run out, you can always generate more. Here’s how.

Note: If you have joined Google’s Advanced Protection Program or use security keys with your account, you may not be able to generate backup codes.

How to retrieve those codes

If you didn’t print out your backup codes upon setting up 2FA, the first thing you need to do is retrieve them. To do that, you must:

  1. Log in to your Google account.
  2. Select 2-Step Verification from the Security menu; you may be prompted to log in once again.
  3. If you haven’t set up backup codes for your account, from the Security menu, select Backup codes from the How you sign in to Google section (Figure A, left).
  4. Otherwise, you may access the backup codes in the 2-Step Verification section (Figure A, right).

Figure A

How to Retrieve and Generate Google 2FA Backup Codes (2)

Once created, you may display your backup codes. You can then download them as a .txt file or print them directly. The list will also show you only those codes you have not used, as the rest will be listed as ALREADY USED.

SEE: Explore TechRepublic Premium’s password management policy.

Word of caution

For those that opt to download the .txt file, I suggest you encrypt that file. Don’t leave it hanging around, unprotected, on your local drive for prying eyes to sneak a peek. Also included in that file is your Gmail address associated with the account. I highly recommend you delete that line in the file on the off-chance someone does stumble upon the file and manages to open it.

The last thing you want is to make it easy for a bad actor to put two-and-two together and realize those codes are associated with that address. There is also a line that looks like this:

Need more? Visit https://g.co/2sv

I recommend deleting that line, as it could give away the secret of what those codes are for. Once you’ve deleted those lines, save and close the file. Encrypt it, and your codes are less likely to be seen by prying eyes.

How to generate new codes

In that same area where your backup codes appear, you’ll see a circle with an arrow (Figure B). Click that, and new backup codes will be generated.

Figure B

How to Retrieve and Generate Google 2FA Backup Codes (3)

Here’s a tip: Only use nine of those codes, and consider the 10th your key to get more codes. This is especially true if you opt to not use a mobile app for Google 2FA. You don’t want to find yourself without that one last key, so you can log in and generate more.

Not a perfect solution

2FA is not a perfect solution. But if you can avoid using sites and services that send 2FA codes via SMS — and if those sites in question start supporting mobile 2FA apps — you’ll be less likely to have your codes stolen and used against you. Even so, you might consider only using these Google codes for 2FA authentication. Use them wisely, and understand that when it comes to security, nothing is ever 100%.

Still not sure about using 2FA codes? Try out these authenticator apps:

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Also Read

  • How to Move Google Authenticator From One iPhone or Android Device to Another
  • How to Set Up Two-Factor Authentication in Linux
  • How to Set Up Two-Factor Authentication on CentOS 7
  • Network Security Policy
  • Cybersecurity: More Must-Read Coverage

Andy Wolber

As a consultant, Andy helps nonprofit organizations understand and leverage technology. He taught the Nonprofit and Government Technology class for Grand Valley State University's Public Administration program for several years. His prior experience includes staff positions with Michigan Nonprofit Association, NPower Michigan, the Dallas Historical Society, Dallas Theater Center, Dallas Black Dance Theatre, and volunteer leadership of the Technology Advisory Committee of the Grand Rapids Community Foundation, as well as the Dallas Arts District Friends. Andy lives Albuquerque, New Mexico with his wife, Liz. Their daughter, Katie, is pursuing a graduate degree in education at Vanderbilt University.

See all of Andy's content

How to Retrieve and Generate Google 2FA Backup Codes (2024)
Top Articles
Wizard101 Hoard and Lore Packs - Final Bastion
Mami Wata — der-andere-film.ch
9.4: Resonance Lewis Structures
Oldgamesshelf
Umbc Baseball Camp
Diario Las Americas Rentas Hialeah
Http://N14.Ultipro.com
Valley Fair Tickets Costco
Poe Pohx Profile
Steamy Afternoon With Handsome Fernando
Obituary (Binghamton Press & Sun-Bulletin): Tully Area Historical Society
Mustangps.instructure
How do you mix essential oils with carrier oils?
Costco in Hawthorne (14501 Hindry Ave)
City Of Spokane Code Enforcement
Progressbook Brunswick
Ap Chem Unit 8 Progress Check Mcq
Buying risk?
ExploreLearning on LinkedIn: This month's featured product is our ExploreLearning Gizmos Pen Pack, the…
Condogames Xyz Discord
Fdny Business
Ahn Waterworks Urgent Care
Marine Forecast Sandy Hook To Manasquan Inlet
Www Craigslist Madison Wi
Craigslist St. Cloud Minnesota
Valic Eremit
Bolsa Feels Bad For Sancho's Loss.
Craigslist Rome Ny
EVO Entertainment | Cinema. Bowling. Games.
Helpers Needed At Once Bug Fables
Page 2383 – Christianity Today
Alima Becker
Kids and Adult Dinosaur Costume
The value of R in SI units is _____?
Kaiserhrconnect
Atlantic Broadband Email Login Pronto
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Movies123.Pick
Natashas Bedroom - Slave Commands
About :: Town Of Saugerties
Weather Underground Corvallis
Sdn Fertitta 2024
Dwc Qme Database
Avance Primary Care Morrisville
Gas Buddy Il
Spurs Basketball Reference
Dagelijkse hooikoortsradar: deze pollen zitten nu in de lucht
Headlining Hip Hopper Crossword Clue
Assignation en paiement ou injonction de payer ?
Service Changes and Self-Service Options
Bloons Tower Defense 1 Unblocked
Mast Greenhouse Windsor Mo
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 5732

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.