What authenticator app do you use? How do you backup? Any open source self hosted options?

    • animist@lemmy.one
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      +1 for aegis. Keep my secret codes in an encrypted backup file just in case

  • DarthRedLeader@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I use Aegis, which automatically backs up with each change to the database to a folder that gets synced to a couple of different computers via syncthing.

    For backup codes, I have a separate keypass database that’s backed up to a couple of places. I thought about using Bitwarden for this backup, but having my 2FA backups in the same place as my passwords kinda defeated the point, IMO.

    Anyway, this system has worked well for me.

  • divinely_splashing@lemmy.worldB
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    Yubico Authenticator and Aegis depending on the importance of the account. I have a secondary Yubikey for quick access backups and a keepass database exclusively for my TOTP keys that I backup to my nextcloud server in real time with versioning. Similarly, I backup my Aegis backups with the nextcloud app.

  • Vanon@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    2FAS, because it’s fucking beautiful (UI, dark mode, lovely site logos). It has a couple backup options. Also using Bitwarden (paid feature) for less important sites; it’s quicker but I prefer my 2FA truly separate from passwords.

    • AngryDemonoid@lemmy.lylapol.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      This looks great! Was going to give it a try, but it doesn’t pull in the service name when importing from Aegis. I don’t want to try it bad enough to manually edit every entry. Lol.

  • DigitalBits@lemmy.fmhy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I usually just use KeePassXC, which is open source and self hosted (kinda). It’s synced over onedrive, though something like syncthing would work fine too.

    No backups per-se, but onedrive should handle accidentally deleted files, and the database is on a few machines anyway so the chances of anything permanently happening to all copies are rather slim.

  • PapyrusOsiris@reddthat.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I use Aegis for 2FA and keepassdx for password management. Syncthing keeps everything synced across devices without any effort on my part.

  • nullptr@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I have a somewhat unpopular take on this. If the service supports hardware tokens, I will use it, any only it, as my 2FA method. However, if the service doesn’t support hardware keys I scan and store the TOTP code in 1Password alongside the password of the service. I realize this will cause some eyerolls because it’s not real 2FA, BUT the 1Password login is protected with a hardware key and it’s extremely convenient.

    I played around using TOTP with Yubico Authenticator in the past, but it turns out you can fit only so many TOTP codes into a single Yubikey (something like 20-30?) This is a showstopper for me since I have hundreds of accounts with TOTP enabled.

  • nicola@lemmy.nzambello.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I use the open source BitWarden password manager as a self hosted service and I am using its otp feature as it is really handy

  • bitwolf@lemmy.one
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    I use both Aegis and VaultWarden (self-hosted). Both can be backed up locally or synced.

  • MrTHXcertified@kbin.social
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Authy for OTP, Bitwarden for passwords.

    As long as my provider shows some concern for the sensitivity of the data I entrust them with, I’m good.