{"id":17841,"date":"2020-09-23T09:31:53","date_gmt":"2020-09-23T09:31:53","guid":{"rendered":"https:\/\/blogs.nist.ac.th\/technology\/?post_type=ht_kb&#038;p=17841"},"modified":"2022-05-30T14:13:04","modified_gmt":"2022-05-30T07:13:04","slug":"google-multi-factor","status":"publish","type":"ht_kb","link":"https:\/\/blogs.nist.ac.th\/technology\/knowledge-base\/google-multi-factor\/","title":{"rendered":"Google Multi-factor Authentication"},"content":{"rendered":"\n<p><strong>There are two ways to set up a second device (factor) for authentication to Google. A or B<\/strong><\/p>\n\n\n\n<p><strong>A. Phone number<\/strong> <\/p>\n\n\n\n<p>OR. <\/p>\n\n\n\n<p><strong>B. Authenticator app. <\/strong>We recommend Authenticator as long as you use a device that will be always with you such as your mobile phone. Many other sites allow you to use Google Authenticator.<\/p>\n\n\n<p><b>A. How to turn on 2-Step Authentication for your Google Account.<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Once you login to Gmail, The system will bring you to the 2 step verification Enroll page. Click the \u201c<\/span><b>Enroll<\/b><span style=\"font-weight: 400;\">\u201d button.<\/span><span style=\"font-weight: 400;\"><br><\/span><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-17847\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out-262x300.png\" alt=\"\" width=\"262\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out-262x300.png 262w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out-44x50.png 44w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out-52x60.png 52w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out-87x100.png 87w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/01_Dont-get-locked-out.png 599w\" sizes=\"auto, (max-width: 262px) 100vw, 262px\" \/><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Login to your account.<br><\/span><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-17848\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST-261x300.png\" alt=\"\" width=\"261\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST-261x300.png 261w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST-44x50.png 44w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST-52x60.png 52w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST-87x100.png 87w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/02_testgmail2-NIST.png 597w\" sizes=\"auto, (max-width: 261px) 100vw, 261px\" \/><\/a><\/li>\n<li style=\"font-weight: 400;\">Put your mobile phone number. The system will send you a text message to your mobile phone.<br><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-17849\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification-264x300.png\" alt=\"\" width=\"264\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification-264x300.png 264w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification-44x50.png 44w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification-53x60.png 53w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification-88x100.png 88w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/03_2-Step-Verification.png 703w\" sizes=\"auto, (max-width: 264px) 100vw, 264px\" \/><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Put the digital code from the mobile phone and click next<br><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-17850\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02-300x236.png\" alt=\"\" width=\"300\" height=\"236\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02-300x236.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02-50x39.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02-60x47.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02-100x79.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/04_2-Step-Veri-02.png 712w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Press the \u201cTurn on\u201d button to activate 2 Step verification for your account.<br><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Once the process is completed you will see this page.<br><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-17851\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03-300x223.png\" alt=\"\" width=\"300\" height=\"223\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03-300x223.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03-50x37.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03-60x45.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03-100x74.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/05_2-Step-Veri-03.png 690w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<\/ol>\n<p><strong>B. How to install Google Authenticator App on mobile devices.<\/strong><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In your <strong>Gmail<\/strong>, Click on your <strong>profile<\/strong> click and select \u201c<strong>Manage your Google account<\/strong>\u201d<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17869 \" src=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-1024x501.png\" alt=\"\" width=\"536\" height=\"262\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-1024x501.png 1024w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-300x147.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-768x376.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-50x24.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-60x29.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51-100x49.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-13.58.51.png 1676w\" sizes=\"auto, (max-width: 536px) 100vw, 536px\" \/><\/a><\/span><\/li>\n<li style=\"font-weight: 400;\">Click at &#8220;<strong>Security<\/strong>&#8220;<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17870 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-300x226.png\" alt=\"\" width=\"300\" height=\"226\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-300x226.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-768x579.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-1024x772.png 1024w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-50x38.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-60x45.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46-100x75.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.00.46.png 1064w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/li>\n<li style=\"font-weight: 400;\">2-Step Verification<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17871 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-300x115.png\" alt=\"\" width=\"300\" height=\"115\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-300x115.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-768x294.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-1024x393.png 1024w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-50x19.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-60x23.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01-100x38.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.02.01.png 1398w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/li>\n<li style=\"font-weight: 400;\">Choose setup <b>Authenticator app<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17872 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-300x252.png\" alt=\"\" width=\"300\" height=\"252\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-300x252.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-768x645.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-1024x861.png 1024w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-50x42.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-60x50.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24-100x84.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.03.24.png 1040w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/b><\/li>\n<li style=\"font-weight: 400;\">Select your Mobile phone\u2019s OS<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17873 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11-292x300.png\" alt=\"\" width=\"292\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11-292x300.png 292w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11-768x789.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11-50x50.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11-58x60.png 58w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11-97x100.png 97w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.11.png 934w\" sizes=\"auto, (max-width: 292px) 100vw, 292px\" \/><\/a><\/li>\n<li style=\"font-weight: 400;\"><b>(On your mobile phone)<\/b><span style=\"font-weight: 400;\"> Download the&nbsp;<\/span><b>\u201cAuthenticator\u201d<\/b><span style=\"font-weight: 400;\"> app to your mobile device.<\/span>\n<ul>\n<li style=\"font-weight: 400; text-align: left;\"><b>Android<\/b><span style=\"font-weight: 400;\"> &#8211; Download in Playstore<\/span><\/li>\n<li style=\"font-weight: 400; text-align: left;\"><b>Apple<\/b><span style=\"font-weight: 400;\"> &#8211; Download in Appstore<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-weight: 400;\">Open the <\/span><b>Authenticator app<\/b><span style=\"font-weight: 400;\"> on your mobile device and create a new profile by scanning a barcode on <span style=\"color: #ff0000;\"><strong>your screen<\/strong><\/span> (not the one below).<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17874 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-261x300.png\" alt=\"\" width=\"261\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-261x300.png 261w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-768x881.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-892x1024.png 892w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-44x50.png 44w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-52x60.png 52w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57-87x100.png 87w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.04.57.png 962w\" sizes=\"auto, (max-width: 261px) 100vw, 261px\" \/><\/a><\/span><\/li>\n<li>Enter the 6-digit code you see in the app.<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17875 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59-300x268.png\" alt=\"\" width=\"300\" height=\"268\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59-300x268.png 300w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59-768x687.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59-50x45.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59-60x54.png 60w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59-100x89.png 100w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.05.59.png 948w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/li>\n<li>Done.<\/li>\n<\/ol>\n<p><strong>How to use Google Authenticator<\/strong><\/p>\n<ol>\n<li>If your mobile phone does not have the Internet to receive Google prompt, click &#8220;Try another way&#8221;<br><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17883 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-250x300.png\" alt=\"\" width=\"250\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-250x300.png 250w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-768x923.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-852x1024.png 852w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-42x50.png 42w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-50x60.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22-83x100.png 83w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-14.16.22.png 932w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/a><\/li>\n<li>Choose &#8220;Get a one-time security code&#8221;<br><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17884 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-267x300.png\" alt=\"\" width=\"267\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-267x300.png 267w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-768x863.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-911x1024.png 911w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-44x50.png 44w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-53x60.png 53w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30-89x100.png 89w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.30.png 1014w\" sizes=\"auto, (max-width: 267px) 100vw, 267px\" \/><\/a><\/li>\n<li>Open &#8220;Authentication&#8221; app on mobile to see the one-time password<br><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/IMG_0F21E472AAA7-1.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17882 size-medium\" src=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/IMG_0F21E472AAA7-1-300x149.jpeg\" alt=\"\" width=\"300\" height=\"149\"><\/a><\/li>\n<li>Enter six-digit number<a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17885 alignnone\" src=\"\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-239x300.png\" alt=\"\" width=\"239\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-239x300.png 239w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-768x964.png 768w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-816x1024.png 816w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-40x50.png 40w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-48x60.png 48w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40-80x100.png 80w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2020\/09\/Screen-Shot-2563-10-12-at-15.26.40.png 980w\" sizes=\"auto, (max-width: 239px) 100vw, 239px\" \/><\/a><\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>There are two ways to set up a second device (factor) for authentication to Google. A or B A. Phone number OR. B. Authenticator app. We recommend Authenticator as long as you use a device that will be always with you such as your mobile phone. Many other sites allow&#8230;<\/p>\n","protected":false},"author":14,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[1122992],"ht-kb-tag":[1193451,1193453,1193452,586333,1123247,589094,1193454],"class_list":["post-17841","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-google-items","ht_kb_tag-2fa","ht_kb_tag-authentication","ht_kb_tag-mfa","ht_kb_tag-password","ht_kb_tag-secure","ht_kb_tag-security","ht_kb_tag-two-factor"],"_links":{"self":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/17841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/comments?post=17841"}],"version-history":[{"count":8,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/17841\/revisions"}],"predecessor-version":[{"id":19433,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/17841\/revisions\/19433"}],"wp:attachment":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/media?parent=17841"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-category?post=17841"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-tag?post=17841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}