Our service
Copyright © 1999–2018 FastMail Pty Ltd
Two-step verification increases the security of your account by requiring something you have (a generated code from an app or a device), to be paired with something you know (your password), in order to log in to your account. We support two-step verification with either an app on your phone, a dedicated security device that plugs into your computer, or a code sent by SMS.
You might have heard of two-step verification being called "two-factor authentication" or 2FA.
It is not required to be set up on your account, but it is recommended if you'd like the peace of mind that comes with the additional security.
You can have more than one two-step verification devices on your account. If you're using the FastMail app on iOS/Android, you must configure an authenticator app as you can't plug in a security device to your phone or tablet.
Learn more about the difference between U2F and YubiKey OTP.
Not sure which authenticator app to use? We recommend:
If you have a different phone, you may still be able to use TOTP. Any app supporting Time-based One-Time Password (TOTP) from the Initiative for Open Authentication (OATH) as specified in RFC 6238 should work.
Note: Neither the Google Authenticator app nor our server implementation is specific to Google in any way, nor does it ever communicate with Google systems as part of its operation (or with any other system for that matter). "Google Authenticator" is the name of Google's TOTP app, which has become synonymous with the authentication method itself.
We have tested with a variety of different security keys, and any key that supports "U2F" should work. We do recommend YubiKey, as in our experience these have the best build quality, a slim profile and are reliable; you can buy one from the Yubico store or via Amazon.
Many manufacturers are now selling standalone OTP devices, often in a credit card or key fob form-factor. We've tested with Feitian c200 devices but any device implementing the TOTP standard should work. We support devices with HEX or BASE32-encoded keys with a 30 or 60-second time step. If your particular device doesn't work, please let us know the make and model of the device and we'll look into adding support for it.
Under the hood, these devices use the same mechanism (TOTP) as "Authenticator Apps" described above, so when adding them, use the "Authenticator App" option.
Open the Settings → Password & Security screen and scroll down to Two-Step Verification.
Before you can enable two-step verification, you must add a recovery phone to your account. This is to prevent you from being locked out of your account should you ever lose access to your main verification device. You get a code sent to your phone instead to complete your second step when you log in.
We also strongly recommend making a note of your recovery code. If you forget your password or lose your security device(s), you can use the recovery code to reset your password and restore access to your account. Write it down or print it out and keep it somewhere safe.
Now you're ready to configure two-step verification. Click Add Verification Device and select which kind of verification device you're adding to your account.
Start by navigating to our login page, then:
If you're using an authenticator app on a phone or through the website, and you use 1Password to manage your passwords, we have detailed instructions on using them together. (FastMail iOS/Android apps, FastMail web client).
If you'd like to revoke a computer's trusted status, you can also do that on the Password & Security screen: the next time you log in on that device, you will need to re-authenticate using your 2FA.
Mail and calendaring computer programs and phone/tablet apps don't support two-step verification, other than the FastMail apps.
You'll need to set up app passwords for each device instead.
In an ideal world, all passwords would be a secret, known only to yourself. But the more a password is used, the more exposed it becomes to malicious attackers. They might try to steal it (through phishing or malware/spyware), or guess it (through brute force repeated dictionary attacks).
The point of two-step verification is that if someone does manage to steal your password, they still can't use it to log into your account without your verification device. Your two-step verificaion keeps your password safe.
Interested in what's happening under the hood to keep you safe? Learn more about how TOTP works, how U2F works, or how YubiKey OTP works.
Keeping your account safe from attackers is very important. But so too is making sure you don't get locked out of your own account. We are aware that SMS is not the most secure of methods for 2FA, and has been deprecated by NIST. However, for the majority of users, the risk of losing their two-step verification device is far greater than the risk of someone hacking their SMS. If you lose your phone, the TOTP key is lost but normally you can get a new SIM card with the same number from your carrier. We therefore believe requiring a phone as a backup option strikes the best balance of confidentiality (no one else can read your data) and availability (you can read your data) for the majority of our users.
Please note, if two-step verification is enabled, access to the phone number itself is not sufficient to gain access to an account: you still need two factors (your password AND the SMS).
Advanced users that understand the risk may remove the phone number from their account once two-step verification is enabled. Once the recovery phone is removed from the account, SMS is no longer an option as the second factor for login. If you choose to do this, we strongly recommend you write down or print your recovery code and store it in a safe location, and that you set up at least two security keys or authenticator devices. Should you lose access to all two-step verification devices and not have your recovery code, you may be permanently locked out of your own account.