How to disable two-factor authentication in Apple ID and fix common errors


When you need to watch movies on Apple TV, you may find that Apple TV requires two-step verification to enter a 4-digit verification code. How to disable two-step verification on iPhone, Apple TV and other Apple devices? If you want to remove an additional layer of protection from unauthorized access to Apple devices, you can learn more about the most effective methods from the article.

Remove two-step verification on Apple devices

  • Part 1. What is two-step verification on Apple TV/iPhone
  • Part 2: How to disable two-step verification on Apple devices
  • Part 3: How to Effectively Remove Two-Step Verification on iPhone
  • > Part 4: Frequently asked questions about disabling Apple's two-step verification

Operating principle. Difference in operation of authentication and verification

The activated multi-level authentication function perfectly protects your account from hacking and unauthorized entry by other users.

Only the owner of the ID will be able to log in, because the system will require you to enter two types of data:

  • Apple ID password;
  • A digital code that will be sent to all trusted devices - it is proof of legal authorization.

Example: You decide to log into your iCloud account from any browser or client program. For this action you need to enter your username and password. After authorization, you will not be able to log into your account - you must additionally enter a code that confirms authorized entry.

The required code is displayed on all gadgets linked to an Apple ID. Enter the numbers into the iCloud authentication window to access your profile.

A visual diagram of how the function works is shown in the figure:

Fig. 2 – operating principle of the option

After the first correct entry of the code, entering numbers will no longer be requested after the next software startup. Re-authentication will only be required in a few cases:

  • When resetting;
  • When you log in again.

Also, the constant introduction of digital codes is mandatory for functions that have an increased degree of security - changing smartphone settings, deleting system parameters, and others.

What is two-factor authentication on iPhone

Two-factor authentication on iPhones is an innovative level of security and one of the most powerful systems for portable gadgets that currently exists. It ensures that only its owner can access the smartphone. Moreover, it will be impossible to connect even if you know the password.

Disabling authorization by backup

For your information! For the first time, measures were provided for users of devices running iOS7, iPadOS 13, OS X 10.11 and higher. If the user has updated his system to version 13 or higher, he can also connect the system in the phone settings.

Verification and authentication. What is the difference?

It is important to distinguish between two-step verification

and
two-factor authentication
, since they have similar effects but different meanings.

Examination

was implemented and introduced into Apple gadgets back in 2015. The main purpose of the option is additional control over logging into your Apple ID account. The check is available starting with iOS 9 firmware.

Authentication

- This is an advanced version of the check. Apple has improved the function and introduced new security management systems into it. In particular, working with location. The principle of working with cards is about.

Each person regularly visits the same places, so on the map you can definitely select several points from which you can easily log in.

If the login is made outside these points, a verification code and a warning about the possible actions of an attacker are immediately sent to trusted devices.

As you can see, authentication is indeed a more automated and reliable method of identity control .

The purpose of the verification is to send a code to a trusted gadget, and authentication also analyzes the location of the device and warns the owner of possible danger.

How to set up two-factor authentication on iPhone

To configure the ID, you need to follow the instructions:

  1. Open the menu and select "Settings".
  2. Find your account name and go to Password & Security.
  3. Enter the phone number of the trusted device on which you plan to receive codes.
  4. Select the type of code reception: SMS messages or calls.
  5. Click "Next".
  6. Enter the verification code that will be sent to the specified phone number.

Important! Within two weeks, the user will have the opportunity to cancel the authentication connection if he suddenly changes his mind. Once this time has passed, it will be impossible to reverse the decision.

You can disable two-factor from the system registration confirmation email. You need to click on the link to return to previous settings.

It is important to remember that abandoning the two-factor system makes the operating system much more vulnerable to hacking, gadget theft, and other negative aspects. Moreover, without enabled protection, you will not be able to use functions that require better protection.


Create a new Apple ID

Setting up authorization also includes adding new trusted devices. It is worth noting that such a gadget must meet certain conditions, namely, use an operating system no lower than iOS 9, iPadOS 13 or OS X 10.11.

Adding another device is easy. This requires:

  1. Enable two-factor authentication on one device and log in with the same Apple ID on another, which you want to make trusted.
  2. Receive a request and enter an access code and perform one of the following actions: receive the code on your iPhone and wait for a notification on it and click “Allow” or receive a verification code to an already trusted number.
  3. Enter the verification code on the new device.

Important! This device will be able to request the code again only when the user logs out of his account, deletes data from the smartphone, or logs into his Apple ID page through the Safari browser.

Feature Requirements

Multi-level authentication is designed for the following gadgets:

  • All iPhone and iPad models that run iOS 9 and newer versions of the operating system;
  • Computers with OS X El Capitan pre-installed. Since access codes that come to your computer are displayed in iTunes, to display messages correctly, use iTunes version 12.3 and higher;
  • iWatch with Watch OS 2 installed;
  • Apple TV (tvOS operating system).

Is there a difference between Apple's two-step verification and two-factor authentication?

Eat. Two-step verification is currently an outdated method of security. It is used mainly by users who do not have the opportunity to update their Apple gadgets or the software on them. Accordingly, two-factor authentication is a newer and more advanced feature that increases the level of device protection to the maximum.

♥ BY TOPIC: iPhone new, demo or refurbished (ref, CPO, like new) - how to check by model number.

Disable authentication

Disabling authentication will prevent you from entering additional access codes. You won't have to confirm your location either. Follow the instructions:

  • Using a desktop browser, go to the iCloud.com cloud storage page;
  • Log in to the system - enter your username and password;
  • Next, enter the access code in the text field that appears , which is shown on other gadgets;

Fig. 4 - entering the verification code

  • Press the “Allow” in the window that appears on your mobile device;
  • Next, the browser will automatically redirect you to the user page. If the browser is not included in the trusted list, on your mobile gadget, click on “I trust this browser” and click on “Continue” ;

Fig.5 – confirmation of login to account

  • After successful login, click on the “Settings” . It is located on the main page of the desktop version of iCloud. Another option for entering settings is to select your username in the upper right corner. Next, in the drop-down list, click on “iCloud Settings” ;

Fig.6 - enabling the settings window

  • In the window that appears, click on the “Manage” . It is located next to the account owner's name;

Rice. 7 – advanced profile management

  • Next, you will be redirected to the Apple website. In a new window you need to log in by entering your Apple ID username and password;

Fig. 8 – authorization on the official website of the manufacturer

  • Go to the account management window and click on the “Security” - “Edit” ;

Fig.9 – changing account configuration

  • Find the "Disable Authentication" and select it. Next, confirm the action by entering the password, which will be sent to the trusted device.

Fig. 10 - deactivating the function

The two-step authentication system is designed in such a way as to protect users as much as possible from all possible hacking attempts. That is why, in order to completely disable the option, the developers have provided for the need to answer a block of questions that you specified when registering your Apple ID.

Only after entering the correct answers into the text fields will you be able to deactivate the option.

Fig. 11 – answers to security questions

Confirm disconnection:

Fig. 12 – final confirmation of turning off the option

What to do if this doesn't help?

As noted above, employees have prohibited disabling the function we are considering for identifiers that are registered in the operating systems iOS 10.3 and macOS 10.12.4, as well as later modifications.

We recommend: Setting up headphones on Android

If you can't set up two-factor authentication on your iPhone, try one of the following methods to solve the problem:

  1. Send a message to an Apple technical support specialist asking him to disable the described option for you.
  2. If the first method does not work, then create a new iCloud ID on the official website and change it on your smartphone. Don't worry about your old iCloud: you can save it for the App Store.

We hope that our article was clear and you figured out the solution to the problem. If you still have questions, ask them in the comments.

Trusted devices

A verified device is any of your Apple devices. The only requirement is that all gadgets must be linked to one ID. It is on the basis of this binding that a group of trusted devices is created.

You will not be able to confirm authentication from a device that is not part of your Apple gadgets group.

Only one owner of a smartphone, tablet, or computer can work with two-step authentication.

List of trusted devices

- this is a list of all gadget models to which a digital code will be sent to confirm entry into the Apple ID or program.

You can view this list in the application itself in the Devices tab.

Fig. 13 – viewing the list of trusted devices

Verified phone numbers

A trusted phone number is the number to which the user expects to receive a digital code sent by the system in the form of text messages and calls. Of course, in order to use the two-factor authentication feature, you must have at least one verified phone number.

In case you suddenly don’t have a trusted device at hand, it makes sense to include your home number, the number of a relative or close friend among the verified numbers. This will allow you to log into your Apple ID account if for some reason you don’t have your gadget nearby.

If you need to change an existing number or add a new one, you should do the following:

1. Open the Settings application and go to the Apple ID (your name) section;

2. Open the "Password and Security" tab.

3. Click on the “Change” link button.

♥ ON TOPIC: How to hide unnecessary pages with applications from the home screen on iPhone and iPad.

Trusted numbers

Trusted numbers are a list of cellular operator numbers to which a digital access code will be sent for authentication. Messages can come not only in text form, but also in the form of a call from an Apple robot.

When you first set up multi-level authentication, you must specify at least one real phone number.

To add a number, you need to enter it in the Apple ID settings field and confirm. As confirmation, enter the code sent to the number in the window that appears.

A SIM card with an associated number must be installed in a trusted device. Otherwise, verification codes will not be received.

Fig. 14 – adding/removing a phone number from a user account

Is it possible to bypass two-factor authentication on an iPhone?

As the manufacturers assure, it is impossible to bypass such a check, but hackers are always coming up with more and more new ways to bypass the protection. So, you can safely receive the code in the form of an SMS or a voice call to a registered trusted phone number. To do this, just remove the SIM card and install it in any other device. It will allow you to accept a code on it without verifying the authenticity of the device.

In another case, the SIM card can simply be cloned by taking a fake power of attorney from the mobile operator. Such fraudulent activities are very common lately. If you have neither access to the password nor a security code, you can use a special 14-character code. If you lose it, you may lose access to your account forever.


How to find out Apple ID on your phone

Thus, two-factor protection is an innovative system that is used by all modern websites and telephone devices (iPhone S, SE and XR). Removing it is not so easy and sometimes impossible. Especially if it was connected to newer phones.

What data do you need to remember?

It is important to remember that two-step authentication is a whole set of actions that are aimed at protecting your data.

For the function to work fully, you will need to remember or write down the following information:

  • Account login and password;
  • Custom codes for programs are digital access identifiers that you yourself set in your account;
  • The main key is a set of letters and numbers that is automatically generated after enabling the option. You will need it if you lose access to all trusted numbers and devices.

Fig. 15 – notification of the received access key

Be sure to screenshot your master key and move it to a folder on your PC or other device. Also, the code can be written down on a flash drive or piece of paper.

Store this data in such a way that no one can find and use the master key.

We also recommend that you update trusted numbers in a timely manner. If you change your SIM card, don't forget to enter the new number into your Apple ID. Otherwise, access to the identifier may be lost.

Monitor the physical security of your devices.

Do not leave your smartphone unattended near strangers and use the fingerprint scanner to restrict unlocking of the gadget.

It is important to protect yourself not only from virtual ID hacking, but also from unauthorized access of other people to your phone/tablet.

Review and management of trusted gadgets

You can view information about gadgets that have received verified status in the “Devices” section of your Apple ID account. There you can also find information regarding these gadgets.

If necessary, the verified device can be removed from the list. After this, it will not be possible to access iCloud and other Apple services until it is authorized again using two-factor authentication.

♥ ON TOPIC: Which smartphone has the best camera - Top 15.

Enabling the feature

Activating the feature will only take a few minutes.

As a result, you will receive an additional security factor that will protect data in the device memory, installed programs and in cloud storage.

On iPhone and iPad

Follow the instructions to enable authentication on your iPhone:

1Open your phone settings window;

2Go to the iCloud field;

3Click on the “Password ” item;

Fig. 16 – account settings on iPhone

4Select “Set up 2-factor authentication” ;

5Enter the code that will be sent to your trusted devices and complete the setup. Write the universal key onto physical media.

On Mac OS

On Mac OS, two-step user authentication is only available in El Capitan and newer operating system firmware:

1Go to the system settings window;

2 Click on the iCloud field and start editing account data mode;

3In a new window, click on “Security” . Next, the system will require you to enter the password for the identifier;

Fig. 17 - editing an account using Mac OS

4Click on the “Set up authentication” , which is located at the bottom of the window. Confirm the digital code that will appear on all devices linked to your Apple ID.

Fig. 18 - setting up the function using Mac OS

Import from Google Authenticator without access to a mobile device

Most of the services discussed above, and many others, allow two-step authentication using the Google Authenticator application. This application allows you to import data. Therefore, if you are planning to change your smartphone, you can move the data from the Google Authenticator of the old device to the new one.

To do this, do the following:

  1. Open Google Authenticator on your old phone and click on the three dots at the top right, then click "Transfer Accounts".
  2. Click "Export accounts".
  3. Select the required accounts and then you will see a QR code that you will need to scan with the Google Authenticator application on your new smartphone. And after that, the new smartphone will be suitable for passing protection in all your profiles.

Alternative receipt of notifications

You can receive access codes not only from trusted devices , but also from the Find My iPhone service.

You can set this option in the Apple ID settings (Security-Send access codes).

As a result, the verification code will be sent not only to trusted devices, but also to the search service for your iPhone.

Thus, in one window you will be able to monitor login attempts from suspicious locations and view the access code.

This option only works with authentication. It is not possible to work with cards for verification purposes.

Fig. 19 – confirmation of logging in using the Find My iPhone service

Create a new account

Would you like to stop using a two-factor security system on devices from? Is there no deactivation option in your phone settings? You can register another “Apple” account. This is done within a few minutes.

To register a profile to work with Apple services, you need to:

  1. Visit the official Apple ID page.
  2. Click on the button responsible for registering a new profile. It's at the top of the screen.
  3. Fill out the electronic form.
  4. Confirm the process of creating a new account.

Now the profile can be used on any Apple devices. But how to do that?

Benefits of Multi-Level Authentication

Any Apple ID stores not only information about linked devices, but also credit card data and personal information of users.

Many people store scans of documents and other important information in the cloud, the theft of which can lead to irreversible consequences.

If you want to always be sure that your information is safe, use two-factor authentication. Feature benefits:

  • A unified security organization for all Apple gadgets;
  • Advanced function control settings;
  • Guaranteed protection against all levels and types of hacking.

Main advantages

The Apple ID contains information about trusted gadgets, as well as bank card information and personal contacts of the owner. In many people’s virtual storage you can find photos of documents and other valuable information, the loss of which can lead to dire consequences. Disabling the two-factor service, as you can see, is not very difficult, but in order to more reliably protect your data, it is still better to use it. I would like to point out the following advantages:

  • all Apple devices have a unified security organization;
  • large selection of control settings;
  • 100% guarantee of ultra-reliable protection against various hacking options.

Disadvantages in the function

Despite all the obvious advantages regarding the security of gadgets, multi-level authentication complicates the life of users - remembering keys, the possibility of losing a number or a trusted device create a number of problems:

  • with multi-level authentication . For example, iMobie AnyTrans or the popular PhoneRescue utility;
  • Difficulties when logging into iCloud - due to a flaw in the option, users often encounter system errors even after entering the correct access key to the cloud storage;
  • Working with a cellular network. If you are in an area with poor coverage, authentication may not work;
  • Linking to codes. The verification can only be carried out if you have a second gadget at hand that is linked to the same Apple ID as the first device.

If you don’t currently have a second gadget near you, you can use a permanent key, which is stored in your account settings, but in practice, users very rarely write down or remember it.

What is a verification code

This is a code that is sent by the system to a trusted device or trusted phone number of the user to verify his identity when he first logs into his account. You can also request such a code on your trusted gadget in the Settings application. It should be remembered that a password and a code are not the same thing. The user creates the password himself, and the system sends him the code.

♥ ON TOPIC: Tap on the iPhone cover - take a screenshot: how to assign actions to touching the back of the iPhone case.

How to reset a forgotten ID password?

If you want to disable authentication, but are still stuck at the password entry stage, you need to reset the password. Follow the instructions:

  • In the Apple ID login window, click on the line “Forgot your password” ;
  • Next, select the “Reset password” ;
  • An active link for setting up a new code word will be sent to the email associated with your account. Check your inbox and follow the link in the email from the sender Apple;
  • In the window that appears, enter a new password . To confirm the action, you need to provide a digital authentication password, which will appear on your other Apple devices. After access is restored, disable two-step authentication as described above in the article.

Fig.20 – entering a new ID password

When logging into your account, a location is displayed that does not correspond to the real one

When a user tries to access his account from a new device, a code is sent to his verified gadget indicating the location of this new device. It may differ from the real one, since the system determines it by the IP address it uses. In this way, the data can indicate the network to which the user is connected, rather than the physical location of the device.

If the user receives a notification that an attempt is being made to log into his account from a new device, but he is not the one logging in, then he must click the “Do not allow” button to block the attempt to access the account.

♥ ON TOPIC: How to charge your iPhone faster: 5 basic rules.

Answers to security questions

If you have successfully completed all the steps to disable authentication, but cannot remember the correct answers to the security questions, follow the instructions:

  • Go to the access recovery page at iforgot.apple.com/password/verify/appleid;
  • Enter your login - the name of your identifier;
  • Click "Continue" ;
  • In the new window, select “Reset questions” ;

Fig. 21 – reset security questions of the identifier

  • Since your account has two-step verification enabled, you will need to enter a digital code in a new window to confirm the action . You will then be redirected to the page for selecting new questions.

The presence of such a check must be present in the Apple ID and cannot be canceled. In a new window, the system allows the user to select three questions from those proposed from the list. These are standard things, the answer to which only the account owner can know.

The answer must be typed into the text box below each question.

Pay attention to the keyboard layout and case - it is better to write everything in small letters, do not use numbers and special characters.

To disable authentication, you must answer two out of three questions.

Fig. 22 – entering new questions and answers

Forgot your password, what should I do?

Go to the “Settings” of the device, go to the section entitled your name for iOS 10.3 and later versions, or to the iCloud section for earlier versions of the platform. There you should select the “Password and Security” section, in the tab of which there will be the “Change Password” item - click on it and specify a new password.

However, this option is only suitable for proven gadgets. If the device is not among the trusted ones, then you should look at the iforgot.apple.com page and follow the steps indicated there.

♥ ON TOPIC: How to teach your iPhone to pronounce the name of the person calling you.

No access to a trusted gadget

If you no longer have access to each of the devices that are included in the "Trusted" , you must use a universal recovery key.

You should have written it down at the stage of enabling two-factor authentication.

The universal key is displayed in your account settings. If you have not logged out of your account, you can view it in the “Settings” - “Security” .

If you managed to log out of your account, Apple support will help you .

Write your appeal with a detailed description of what happened and wait for a response. Link: https://support.apple.com/ru-ru.

Fig. 23 – online user support

Switch account

It only takes a few minutes. Changing your Apple ID account will help you disable two-factor authentication on your Apple device.

You can switch to the newly created account like this:

  1. Go to the settings of your mobile device.
  2. Click on your ID and then select the “Sign Out” option.
  3. Enter your password and then confirm logging out.
  4. Log in to the Apple ID section again.
  5. Click on the line “Do not…”.
  6. Specify new data for working with iPhone. This is a newly created account.

That's all. Now you can make a “backup” of the cloud service. To successfully complete the operation, you must have an Internet connection. Without it, it will be impossible to achieve the desired goal.

The message with the code does not arrive - solution

In most cases, problems with receiving verification codes arise due to isolated failures in the OS. Not receiving a notification with numbers to confirm authentication?

Try sending the code again or restart both devices.

Another case : a message arrived on a trusted device, but it was not displayed in the notification center. Check your inbox, the numbers you need should be there. The sender of the letter is Apple.

As a reset option, you can delete the email chain from Apple and resend the authentication message.

Perhaps the memory allocated for storing one bunch of letters has run out.

No notification received

Typically, failures to obtain a verification combination occur as a result of an operating system failure. If this happens to you, you can try resending the code or rebooting both devices. It may happen that an SMS has arrived, but is not displayed in the notification center. Look at your inbox, the required combination should be there. The sender must be an Apple corporation.

There is also an excellent reset method - deleting letters from the manufacturer and resending the SMS. In some cases, an error occurs because the memory allocated for storing letters from one recipient is full.

The program does not support verification code - what should I do?

Not all programs have a built-in ability to work with verification codes. You can configure this function yourself in your profile.

Log into your account using a browser and set a password for logging into third-party programs yourself.

Costume codes will be known only to you. Use them to log into all services that use your Apple ID profile - iCloud cloud, standard email client, calendar, Notes and other software.

Follow the instructions:

  • Sign in to your Apple ID using your browser. Use the address https://appleid.apple.com/#!&page=signin;
  • After logging into your account, find the “Security” and click on the “Change” ;

Fig. 24 – ID security settings

  • In the new window, click on “Create a password” . Next, select a program or set of applications to which the specified digital code will be applied. Save your settings. Now, when you try to log into the program, you will need to enter the specified numbers.

What to do if the program does not support verification code?

Not all software comes pre-installed with the ability to interact with special codes. It is configured in the account. To do this, you need to get into your own profile through a browser and come up with your own password to enter various programs. Only you will know such pins; you can take them for all services that use Apple ID:

  • cloudy iclud;
  • calendar;
  • notes and more.

Follow these steps:

  • log in via browser;
  • go to “Security” and click “Change”;
  • in a new window, select creating a password, select an application or several where the created pin will be used;
  • save the changes. After which, when logging in, you will need to enter the password you created.

Error: “Enable verification will be available later”

If you encounter this system message when trying to activate multi-level authentication, it means that you will not be able to configure the option in the near future.

This only happens in two cases - after you recently changed the password for your Apple ID account or as a result of adding a new security question.

The user cannot change the password and set up verification at the same time, since the Apple system regards these actions as a possible attempt by an attacker to access your account.

The setup error message indicates the date from which you can begin creating multi-level authentication.

A notification of this will be sent to the email associated with the ID.

Fig.25 – error window

How it works?

This concept is an additional security feature of Apple ID that ensures that only you can access your account, even if someone else knows your security password. This is a cutting-edge approach to protecting user data. This way, you can get a 100 percent guarantee that no one else will use your device.

The enabled multi-level identification option does an excellent job of protecting your account from hacking and penetration by other users. Only the owner of the identifier can enter here, because the system requires entering two types of information:

  • password from Apple ID;
  • code with numbers sent to all trusted devices - this is proof of authorized authorization.

I’ll explain with a small example: you wanted to get into your personal iCloud profile from some browser or application. To do this, you need to enter your login and password. But even after successful authorization, you do not log into your account - you need to enter a pin confirming your legal login.

This code will be located on devices linked to Apple ID. So you need to enter the numbers in a special window in iCloud to gain access to your profile.

If you enter the numbers correctly the first time, then after further activations of the software, its input will no longer be required. A repeat procedure may be necessary in the following cases:

  • parameters were reset;
  • re-login is performed.

In addition, it is imperative to constantly enter digital protections for functions that have a high level of reliability, for example, when changing phone parameters, deleting system settings, and the like.

How to disable Apple ID two-factor authentication?

Really. Turn it on - you don't need much intelligence.

Moreover, Apple VERY persistently recommends doing this.

How to turn it off?

  • In short, practically nothing. Apple cares about our safety and categorically prohibits such manipulations.
  • In a little more detail, there are instructions here that tell you how to disable Apple ID two-factor authentication. From which, by the way, you can find out that in some cases disabling the “two-factor” system is still possible. I highly recommend reading it!

And then, why turn it off? Once you've turned it on, you have to use it! Or is it not necessary? After all, when using it, the following problem may arise...

Rating
( 2 ratings, average 4.5 out of 5 )
Did you like the article? Share with friends:
For any suggestions regarding the site: [email protected]
Для любых предложений по сайту: [email protected]