All Collections
Scanning
Settings
Scanning Targets with 2FA
Scanning Targets with 2FA

Learn about scanning targets with Two-Factor Authentication (2FA) enabled.

Jaime Vasconcelos avatar
Written by Jaime Vasconcelos
Updated over a week ago

Two-factor authentication (2FA) strengthens authentication with an additional layer of security that requires presenting an extra piece of evidence (the possession factor) to an authentication mechanism of a website or application.

In Probely, you can scan websites or applications that use 2FA by configuring it in the Two-Factor Authentication (2FA) section of your target settings.

After setting up your target authentication with Login Form or Login Sequence, you have two options at your disposal to configure the 2FA:

  • Time-based One-time Password (TOTP)
    Choose this option if, in your 2FA scenario, the factor is obtained using an authenticator like Google Authenticator, 1Password, Authy, or Microsoft Authenticator, which provides a random code that changes frequently. This random and temporary code is called a Time-based One-time Password (TOTP).
    To configure this option, read this article on How to set up Target 2FA with TOTP.
    โ€‹

  • Other OTP
    Choose this option if, in your 2FA scenario, the factor is obtained as a random code sent through a communication channel like an email or a text message. This random code is called a One-time Password (OTP).
    To configure this option, read this article on How to set up Target 2FA using an alternative OTP.

Read the following articles to learn more about other authentication options for your targets:

Did this answer your question?