Two-factor authentication (2FA) significantly increases the security of a GiDiNet account by combining the password with a temporary code generated by one or more devices in the user’s possession. Even if the password is compromised, access to the account remains protected thanks to the additional authentication factor.
Technology used
GiDiNet’s 2FA system is based on the TOTP (Time-based One-Time Password) standard, which is supported by many authentication applications. Any TOTP-compatible app can be used, such as Google Authenticator, Microsoft Authenticator, Authy, or other equivalent solutions.
2FA device registration
Up to three 2FA devices can be registered for each account. This design is intended to support common real-world scenarios, including:
- having a backup device available in case the primary device is lost or unavailable;
- allowing multiple authorized users to access the same account, each with their own authentication device.
Each registered device generates its own TOTP codes and is managed independently.
Phone number and administrative operations
A single primary mobile phone number is associated with each account for 2FA management. This number is used exclusively for administrative and security-related operations affecting all 2FA devices linked to the account, including:
- management and replacement of 2FA devices;
- removal of a device that is no longer available;
- controlled access recovery in case of authentication issues.
The phone number is not used for daily account access, does not replace the TOTP code generated by the authentication app, and is not linked to a specific device, but serves as a central security reference for the account.
Notifications and control
Every operation involving 2FA devices is notified by e-mail to the account holder, including the registration of a new device, the removal of an existing device, and any administrative security-related actions. This ensures that the user always has full visibility and control over changes affecting account protection.
Device management and replacement
2FA devices can be removed or replaced either by using an already registered device, or through administrative intervention when a device is no longer usable. All such operations are always logged and notified by e-mail.