Skip to main content
Tech Radar TechRadar the technology experts
Sign in
  • View Profile
  • Sign out
RSS
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
  • Phones
  • Computing
  • TVs
  • AI
  • Streaming
  • Health
  • Audio
  • VPN
  • More
    • Cameras
    • Home
    • News
    • Reviews
    • Opinion
    • How to
    • Versus
    • Deals
    • Coupons
    • Best
Tech Radar Pro
Tech Radar Gaming
Trending
  • Amazon Prime Day
  • Back to school
  • Nintendo Switch 2
  • Best VPN
  • ChatGPT
  • NYT Wordle today
  • Best laptop
  • Best web hosting
Recommended reading
Pink iPhone chained up
Phones Worried about phone snatchers? These 5 invaluable iPhone and Android settings will keep you safe and connected this summer
Sign in with Apple Button for your privacy. Man holds a smartphone and authorizes the Internet service
Security Popular TikTok video editor CapCut used to trick victims in phishing scam
OnePlus 12 phone showing Google Wallet
Android Google Wallet could soon get this big security upgrade on Android and Wear OS to protect your cards
1Password
Websites & Apps I’ve said goodbye to forgetting my passwords and you can too
Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome.
Software & Services I reviewed hundreds of apps for a living, and these are the security features that best protect your data
an image of an iPhone 16 Pro Max on a black table showing the Passwords app
iPhone My favorite iOS 18 app is a tool you're probably not using – and I suggest you try it right away
Ledger Lifestyle Image
Security Mac users beware - fake Ledger apps are being used by hackers to steal seed phrases and hack accounts
  1. Computing
  2. Computing Security

How to add extra security to your Apple ID

How-to
By Cliff Joseph published 23 January 2017

Secure your Apple ID

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Boost your Apple ID protection

Boost your Apple ID protection

Last year Apple received criticism when a number of celebrities claimed their iCloud accounts had been hacked, leading to personal photographs being published online. Apple's response was to remind people to keep their passwords safe.

However, security experts argued that this couldn't have happened if Apple had adopted a security technique known as two-factor authentication to Apple ID. This adds a second layer of security to your Apple ID, sending an extra security code to your iPhone or iPad that must be entered in addition to your normal Apple ID or iCloud password before anyone can gain access to your account.

That was back in 2014, and thankfully Apple has now included two-factor authentication for its products, building the technical underpinnings for it into OS X El Capitan and iOS 9, which is no small task.

For more information check out our guide on how to enable two-factor authentication on your iPhone or iPad.

Apple's two-factor authentication has a limitation, however. It's only available if all the devices linked to your Apple ID are running Apple's latest software – the web page just mentions details of the system requirements for Apple devices and Windows PCs.

So, if you use your iCloud account on one device that isn't running, or is unable to run, the latest software, you won't be able to benefit from the stronger protection afforded by two-factor authentication on any of your other devices.

However, in the wake of the celebrity hacking scandal, Apple introduced a security measure it calls two-step verification. Though it bears a similar name and works in a similar fashion to two-factor authentication, it merely sends a four-digit verification code to you; two-factor authentication's codes are six digits long, and are pre-empted by details of an access attempt's location, so you can reject it immediately rather than receive a code.

In the long run, two-factor authentication will be the stronger option. However, until everyone can use it, two-step verification is worthwhile because it adds extra security to your Apple ID to help keep your data safe.

Also, you don't need to be running iOS 9 or El Capitan to benefit from it, so having one bit of hardware running an older operating system won't hold you back.

Page 1 of 13
Page 1 of 13
1. Manage your Apple ID

1. Manage your Apple ID

To set up two-step verification, go to the Apple ID website using a web browser on any device. Right now only the email address and password associated with your Apple ID are needed to sign in, but that will change in a moment.

Page 2 of 13
Page 2 of 13
2. Request to turn on

2. Request to turn on

Under Security, click Get Started next to Two-Step Verification. Apple will send a confirmation email.

If you've made significant account changes recently, this email can take three days to arrive; your account works as normal in the interim.

Page 3 of 13
Page 3 of 13
3. Confirm it's you

3. Confirm it's you

When you receive the email, return to your Apple ID account page and click Get Started again. A message will explain two-step verification sends an extra verification code to one of your devices.

This code can only be used once.

Page 4 of 13
Page 4 of 13
4. A trustworthy phone

4. A trustworthy phone

Now you have to provide a 'trusted phone number'. This doesn't have to be an iPhone, or even your own phone – but it should obviously belong to someone that you trust, and the phone must also be able to receive text messages.

Page 5 of 13
Page 5 of 13
5. Other trusted devices

5. Other trusted devices

You can add other trusted devices to your account, and send the verification code to any of those devices.

During this step you should make sure that all your devices are awake, signed in to your Apple ID, and connected to the internet.

Page 6 of 13
Page 6 of 13
6. Verification codes

6. Verification codes

Each device or phone number that you identify as trusted receives a special one-off verification code.

You can read the code on that device and then enter it on the Apple ID management site to confirm the device is in your possession.

Page 7 of 13
Page 7 of 13
7. Your Recovery Key

7. Your Recovery Key

Your final line of defence is a special recovery key. Should you forget your password, or if your trusted devices are lost or stolen, you can use this key to regain access to your account – so commit it to paper and keep it safe!

Page 8 of 13
Page 8 of 13
8. Who goes there?

8. Who goes there?

In future, when you sign in to your account, you'll be asked to enter your password as usual. However, there's now a second verification step, so you'll be asked on which of your trusted devices you want to receive a verification code.

Page 9 of 13
Page 9 of 13
9. Device defence

9. Device defence

We've sent the verification code to our iPhone. On whichever trusted device you choose, the code will appear after a few seconds.

Enter the code on whatever device you were using to sign in to your Apple ID and access your account.

Page 10 of 13
Page 10 of 13
10. Purchase protection

10. Purchase protection

Extra protection now applied on any Mac or iOS device linked to your Apple ID. Here it has kicked in when we tried to buy an app on our iPad.

A code is also needed to sign in to iCloud on a new device, or to use apps such as FaceTime.

Page 11 of 13
Page 11 of 13
11. Third-party apps

11. Third-party apps

Apps such as Fantastical connect to your iCloud account but provide no way for you to enter a verification code; an app-specific password is needed to grant them access.

Edit your account's security settings, then click Generate Password.

Page 12 of 13
Page 12 of 13
12. Manage them

12. Manage them

In your app's password request box, immediately enter the generated password. You can create up to 25 appspecific passwords.

If you alter your main one, all of these will be revoked and you'll need to generate new ones for your apps.

  • Enjoyed this article? Get more tutorials, guides, and tips on how to get the most from your Apple devices inside MacFormat. Take advantage of an exclusive offer in our sampler today.
Page 13 of 13
Page 13 of 13
TOPICS
Apple
Cliff Joseph
Contributor

Cliff Joseph is a former Editor of MacUser magazine, and a freelance technology writer with 30 year’s experience in the industry (and old enough to remember when Apple was close to going bust…).

His first job involved using Macs for magazine sub-editing and typesetting, which led to the realisation that these computer-thingies might actually turn out to be useful after all. After a few years specialising in the Mac side of the market, he went freelance and embraced the wide world of digital technology, including Windows PCs, digital audio and hi-fi, and networking. Somewhere along the line he also developed a bit of a gaming habit and has stubbornly waved the flag for Mac gaming for far too many years.

See more Computing How Tos
Read more
Pink iPhone chained up
Worried about phone snatchers? These 5 invaluable iPhone and Android settings will keep you safe and connected this summer
Sign in with Apple Button for your privacy. Man holds a smartphone and authorizes the Internet service
Popular TikTok video editor CapCut used to trick victims in phishing scam
OnePlus 12 phone showing Google Wallet
Google Wallet could soon get this big security upgrade on Android and Wear OS to protect your cards
1Password
I’ve said goodbye to forgetting my passwords and you can too
Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome.
I reviewed hundreds of apps for a living, and these are the security features that best protect your data
an image of an iPhone 16 Pro Max on a black table showing the Passwords app
My favorite iOS 18 app is a tool you're probably not using – and I suggest you try it right away
Latest in Computing Security
A phone showing the download page for Microsoft Authenticator
Microsoft is phasing out passwords soon – here's why passkeys are replacing them and what to do next
A person holding a phone looking at a scam text with warning signs around
FBI issues urgent warning about new SMS toll scam – here's how to spot it and what to do
Poland's Prime Minister Donald Tusk attend a joint press conference with the European Commission President after a meeting of the College of Commissioners with members of the Polish government in Gdansk, Poland on February 7, 2025.
Chat Control – Poland's EU Presidency gives up on the voluntary scan of your encrypted chats
The eyes of Big Brother is watching secretly from behind the digital curtain of the EU flag
Experts "deeply concerned" by the EU plan to weaken encryption
In this photo illustration the Meta logo and European Union flag are displayed on a mobile phone screen
"Meta AI non-compliant with GDPR" – Digital rights group menaces Meta with injunction over EU AI training
In this photo illustration, the Meta AI logo is seen displayed on a smartphone screen
German consumer protection group calls on Meta to halt its AI training in the EU – will other countries follow suit?
Latest in How Tos
Google Chrome logo on desktop and mobile
How to private browse in Chrome on Windows, Android and ChromeOS
Coco Gauff practicing for Wimbledon 2025
How to watch Yastremska vs Gauff at Wimbledon 2025 on BBC iPlayer (it's free)
Emma Raducanu preparing for Wimbledon 2025
How to watch Raducanu vs Xu online: live stream Wimbledon 2025 tennis FREE
A woman dances on a friend's shoulders at the Glastonbury Festival held at Worthy Farm, in Pilton, Somerset on June 29 near Glastonbury, England. The festival, founded in 1970, has grown into one of the largest outdoor green field festivals in the world.(Photo by Matt Cardy/Getty Images)
How to watch Glastonbury replays on BBC iPlayer (it's FREE)
Max Verstappen leads the pack at the beginning of the 2024 Austrian GP.
How to watch Austrian Grand Prix F1 on ORF On today (it's free)
Jake Paul and Julio Cesar Chavez Jr. in their face off for their fight on 28 July.
How to watch Jake Paul vs Chavez Jr live on DAZN tonight – best PPV prices, start time
LATEST ARTICLES
  1. 1
    Microsoft 365 and Google Workspace could put sensitive data at risk because of a blind spot in default email behavior
  2. 2
    Together is finally coming to theaters - here are 3 reasons you shouldn't miss the body horror movie
  3. 3
    Don't let this early Prime Day deal pass you by – our favorite gaming earbuds have never been cheaper
  4. 4
    Apple is reportedly looking to power Siri’s AI with OpenAI or Anthropic, here’s why I hope they do
  5. 5
    Google Gemini is set to become a significantly better phone assistant thanks to these two small upgrades

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...