Skip to content

Commit 2697769

Browse files
authored
Create 2025-10-30-email-2FA.mdx
1 parent b92d393 commit 2697769

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Introducing email two-factor authentication
3+
description: Cloudflare now offers email two-factor authentication to protect your account
4+
date: 2025-10-30
5+
---
6+
7+
Two-factor authentication (2FA) is one of the best ways to protect your account from the risk of account takeover. Cloudflare has offered phishing resistant 2FA options including hardware based keys (eg Yubikey) and app based TOTP (time-based one-time password) options which use apps like Google or Microsoft's Authenticator app. Unfortunately, while these solutions are very secure, they can be lost if you misplace the hardware based key, or lose the phone which includes that app. The result is that users sometimes get locked out of their accounts and need to contact support.
8+
9+
Today, we are announcing the addition of email as a 2FA factor for all Cloudflare accounts. Email 2FA is in wide use across the industry as a least common denominator for 2FA because it is low friction, loss resistant, and still improves security over username/password login only. We also know that most commercial email providers already require 2FA, so your email address is usually well protected already. Cloudflare will now prompt you during the login flow to enable email 2FA to better protect your account, and avoid getting locked out in the future.
10+
11+
## Sign-in security best practices
12+
13+
Cloudflare is critical infrastructure, and you should protect it as such. Please review the following best practices and make sure you are doing your part to secure your account.
14+
15+
- Use a unique password for every website, including Cloudflare, and store it in a password manager like 1Password or Keeper. These services are cross-platform and simplify the process of managing secure passwords.
16+
- Use 2FA to make it harder for an attacker to get into your account in the event your password is leaked
17+
- Store your backup codes securely. A password manager is the best place since it keeps the backup codes encrypted, but you can also print them and put them somewhere safe in your home.
18+
- If you use an app to manage your 2FA keys, enable cloud backup, so that you don't lose your keys in the event you lose your phone.
19+
- If you use a custom email domain to sign in, [configure SSO](https://developers.cloudflare.com/fundamentals/manage-members/dashboard-sso/).
20+
- If you use a public email domain like Gmail or Hotmail, you can also use social login with Apple, GitHub, or Google to sign in.
21+
- If you manage a Cloudflare account for work:
22+
- Have at least two administrators in case one of them unexpectedly leaves your company
23+
- Use SCIM to automate permissions management for members in your Cloudflare account

0 commit comments

Comments
 (0)