Verification code does not come on iphone. Two-factor authentication for Apple ID

Learn more about iCloud Keychain.

What is the iCloud Keychain?

ICloud Keychain stores current user names and passwords for websites from the Safari browser, data credit cards  and information about Wi-Fi networks from all approved devices running iOS 7.0.3, OS X Mavericks 10.9 and later.

In addition, it stores Mail, Contacts, Calendar, and Messages accounts synchronized with all your Mac computers. And when you log in to Facebook, Twitter, LinkedIn, and other Internet accounts, iCloud automatically adds usernames and passwords to all devices.

How does iCloud Keychain protect my personal information?

ICloud Keychain Sync passwords and credit card information are only stored on approved devices. When iCloud Keychain is turned on on a new device, other devices that have this feature configured will receive a confirmation request for the additional device. After confirmation, iCloud Keychain automatically starts updating information on the new device.

Information security iCloud keychains in storage and during transfer are provided.

If used, the device is considered trusted when logging in. To enable iCloud Keychains, you won’t need additional device approval.

How to set up iCloud Keychain?

After iPhone updatesiPad or iPod touch  until Setup Assistant asks you to configure iCloud Keychain. If you skipped this step and now want to install the iCloud Keychain, follow these steps:

  1. Click Settings\u003e [Your Name]\u003e iCloud.
    • In iOS 10.2 or earlier, go to Settings\u003e iCloud.
  2. Click Keychain and slide the slider to enable the iCloud Keychain feature.

On the mac computer  running OS X Mavericks 10.9 or later:

  1. Choose Apple menu ()\u003e System Preferences and click the iCloud icon.
  2. Select Keychain. If necessary, you can set a password to unlock the screen after sleeping or after activating the screen saver.
  3. Enter your Apple ID and password.
  4. Follow the onscreen instructions.

On each device you want to add. When iCloud Keychain is turned on on a new device, other devices that have this feature configured will receive a confirmation request for the additional device. After confirmation, iCloud Keychain automatically starts updating information on the new device. If used, you can enable the iCloud Keychain without receiving approval from the device.

What is iCloud security code?

When you configure the iCloud Keychain feature, you can create an iCloud security code. It can be a six-digit code, a complex alphanumeric code, or we can create an arbitrary code for you. The iCloud security code is used to authorize additional devices in the iCloud Keychain function. In addition, it allows you to identify the user and open access to other features of the iCloud Keychain function, for example, to restore its data in case of loss of all devices.

How can I configure the iCloud Keychain feature on a new device so that approval from another device is not required?

If you do not have access to any of your devices on which the iCloud Keychain function is configured, you can still on another device if you have:

  • ICloud Security Code.
  • Devices with the phone number specified when setting up the iCloud Keychains and the ability to send SMS messages. An SMS message with a confirmation code is sent to this number. If this number is not available, contact Apple Support to verify your identity and complete the feature setup on the new device.

After the setup is complete, the iCloud Keychain settings will be transferred in push mode from the cloud to the new device.

If used, enter a password and a six-digit verification code, which is automatically displayed on trusted devices, and authorize the new device. Then enable the iCloud keychain.

Can Apple Support Recover iCloud Security Code?

Not. If the number of incorrect entries in the iCloud security code exceeds the allowable threshold, you will lose access to the iCloud Keychain feature. In this case, contact Apple Support to verify your identity and re-enter your iCloud security code. After a certain number of incorrect entries, the iCloud Keychain will be deleted from Apple servers and will have to be re-configured.

Can iCloud Keychain function be configured so that information is not stored in iCloud?

Yes. When setting up the iCloud Keychain feature, you can skip the step of creating an iCloud security code. Then the relevant data will be stored locally and updated only on devices approved by you.

Unless you create an iCloud security code, Apple cannot help restore the iCloud keychain.

To configure the iCloud Keychain feature without creating an iCloud security code, follow these steps:

On the iPhone device, iPad or iPod touch:

  1. Choose Settings\u003e [your name]\u003e iCloud and click on Keychain. In iOS 10.2 or earlier, go to Settings\u003e iCloud and click Keychain.
  2. enter password apple ID  ID
  3. When you are prompted to use the device password as an iCloud security code, click Create another code.
  4. Open Advanced Options, then select one of the following options.
    • Do Not Create Security Code. If you do not create an iCloud security code, your iCloud keychain is stored locally on your device, not on Apple's servers, and will only be updated on devices you have approved.
  1. Choose Apple menu ()\u003e System Preferences.
  2. Click the iCloud icon, and then select the Keychain check box.
  3. Enter your Apple ID password.
  4. Click Advanced, then select one of two options.
    • "Get a random security code."
    • Do Not Create Security Code. If you do not create an iCloud security code, your iCloud keychain is stored locally on your Mac, not on Apple servers, and will only be updated on devices you have approved.
  5. Follow the on-screen instructions to complete the iCloud keychain setup.

What happens if iCloud Keychain is disabled on my device?

When you turn off the iCloud Keychain function, the device prompts you to choose an action: save or delete stored passwords and credit card data. When you select the first option, the data is not deleted, but also not synchronized when they are changed on other devices.

What credit card information is stored in the iCloud Keychain?

The iCloud Keychain stores credit card numbers and expiration dates. Credit card security codes are not stored or populated automatically.

Does iCloud Keychain work with third-party software?

Yes. Developers can update programs for working with the iCloud Keychain. Then the passwords stored by the programs will be synchronized with passwords on other devices running iOS 7.0.3, OS X Mavericks 10.9 or later, on which these programs are installed.

Can I delete my iCloud Keychain data from Apple servers?

Yes. Follow these steps on your iPhone, iPad, iPod touch, or Mac using iCloud Bundle:

On an iPhone, iPad, or iPod touch with iOS 10.3 or later:

  1. Click Settings\u003e [Your Name]\u003e iCloud.
    • In iOS 10.2 or earlier, go to Settings\u003e iCloud.
  2. Click Keychain\u003e Advanced.
  3. Turn off the Confirm with Security Code option.
  4. Disable the iCloud Keychain feature on all devices where it is enabled.

On a Mac with OS X Mavericks 10.9 or later:

  1. Choose Apple menu ()\u003e System Preferences. Click iCloud, then select Account.
  2. Uncheck Allow confirmation using security code.
  3. Disable iCloud Keychain on all devices where it is enabled.

After completing these steps, the data from your Keychain will still be stored on local devices, but until the iCloud Keychain function is turned off, the changes will not be synchronized with other devices. If you want to transfer keychain data in push mode to all your devices, but not to the cloud, but do not create an iCloud security code.

Publication date: 06/20/2017

Apple devices are known to allow two-step authorization. This security method performs at least two authentication checks - password and trusted device - to access your account.

Two-step, or as it is also called, two-factor authentication (2FA) provides reliable data protection, since it requires not only password knowledge, but also physical access to one of the keys, in our case iPhone or iPad.

Needless to say, we strongly recommend using it on any account where this is possible. Moreover, if the service does not support 2FA, you should think twice before using it, if the security of your data is important to you.

If two-step authentication is enabled on your Apple ID (which, in a good way, would have to be done), then you most likely came across a window that asks you to confirm that you are the owner this account. This screen should list some of your Apple devices and at least one certified telephone number. These devices act as access keys.

Have you ever wondered what requirements the devices on the list should satisfy? Or maybe you needed to add or remove a device from this list? In this tutorial, we will talk about managing trusted devices for 2FA.

How to add a trusted device

To add the device as one of the authentication keys, you just need to enable the Find iPhone service on your iPhone, iPad or iPod Touch. As soon as you enable the function, the device will automatically be added to the list of trusted ones. After that, you will need to confirm the addition of this device.

Step 1:  Log in to iCloud and enable the Find iPhone service on the device you want to trust in Settings\u003e iCloud.

Step 2:  In Safari, log in to My Apple ID, go to Password and Security\u003e



Step 4:  A four-digit confirmation code will come to this device.

Enter this code in the field that appears in Safari and click Confirm device.


Now you can verify that the device is verified as trusted. Now, whenever you need to use two-step authentication for login in Apple ID, you can use this device as a key.


How to remove a trusted device

Not surprisingly, devices can also be removed from the trusted list. When you exit iCloud or turn off Find iPhone, your device ceases to be trusted, but it still appears in the list as possible trusted.

Step 1:  Turn off Find iPhone.


Step 2:  In Safari, log in to My Apple ID, go to Password and Security\u003e Add or Remove Trusted Device.



Confirm removal.


That, in general, is all. In this simple way, trusted devices are added and removed for two-step identification. You will often have to work with this list, especially if you like to constantly log out of accounts and use different devices.

Two-factor authentication is an additional level of security for Apple ID, which ensures that only you can access your account, even if the password is known to someone else.

How it works

When using two-factor authentication, access to your account is only possible from trusted iPhone, iPad, or Mac devices. When you first log in to a new device, you will need to provide two types of information: your password and a six-digit digital verification code, which is automatically displayed on trusted devices. After entering the code, the new device is included in the number of trusted devices. For example, if you have an iPhone, the first time you log in to your account on a recently purchased Mac, you will be asked to enter a password and a verification code that will automatically appear on your iPhone.

Since password access is not enough to access your account with two-factor authentication, the security of your Apple ID and stored on servers Apple data  increases significantly.

After logging in, the verification code will no longer be requested on this device until it is completely logged out, all data on the device is erased, or until the password is changed for security reasons. When logging in via the Internet, you can indicate that the browser is trusted, and the next time you log in from this computer, a confirmation code will not be requested.

Verified Devices

The verified device can be an iPhone, iPad, or iPod touch with iOS 9 or later, or a Mac with OS X El Capitan or later that was signed in with two-factor authentication. This is a device for which we know its affiliation to you, and which can be used to verify identity by displaying a code apple confirmations  When logging in from another device or browser.

Verified Phone Numbers

A verified phone number is a number that you can use to receive confirmation codes through text messages or automatic phone calls. You must verify at least one trusted phone number in order to access two-factor authentication.

You should also consider verifying other trusted numbers that you can access, such as your home phone number or a number used by a family member or close friend. You can use these numbers if you are temporarily unable to access your own devices.

The verification code is different from the one you entered to unlock your iPhone, iPad, and iPod touch.

Configure two-factor authentication for Apple ID

Two-factor authentication is currently available for iCloud users who use iOS 9 or OS X El Capitan or later on at least one device. .

To enable two-factor authentication, you can follow these steps on your iPhone, iPad, or iPod touch.


Enabling two-factor authentication in the Settings section

If your device is running iOS 10.3 or later, follow these steps:

  1. Go to Settings\u003e [your name]\u003e Password and Security.
  2. Click Continue.

If your device is running iOS 10.2 or earlier, follow these steps:

  1. Go to Settings\u003e iCloud.
  2. Select your Apple ID\u003e Password and Security.
  3. Click Enable Two-Factor Authentication.
  4. Click Continue.

You may need to answer test questions  Apple ID


Entering and Confirming a Trusted Phone Number

Indicate the phone number to which you need to receive verification codes when entering the system. You can choose to receive codes in the form of text messages or automatic phone calls.

Enter your verification code to verify your phone number and enable two-factor authentication.

On a Mac with OS X El Capitan or later, follow these steps:


  1. Go to Apple menu\u003e System Preferences\u003e iCloud\u003e Account.
  2. Click the Security Icon.
  3. Click Enable Two-Factor Authentication.

Some Apple IDs created on iOS 10.3 or macOS 10.12.4 and later are protected by two-factor authentication by default. In this case, two-factor authentication will already be enabled.

If you are applying two-step verification and want to increase the level of security,.

If two-factor authentication cannot be enabled for your account, you can still protect your information.

Things to Remember When Using Two-Factor Authentication

Two-factor authentication greatly enhances Apple ID security. After enabling this function, you will need a password and access to verified devices or a verified phone number to log in to your account. To ensure maximum protection of your account and constant access, there are a few simple recommendations that you must follow:

  • Remember your apple password  ID
  • Use passwords for all your devices.
  • Update your verified phone numbers in a timely manner.
  • Ensure the physical security of verified devices.

Account management

You can manage your verified phone numbers, verified devices, and other account information on.

Timely update of verified phone numbers

To use two-factor authentication, you will need to have at least one verified phone number in the database to which you can receive confirmation codes. To update verified phone numbers:

  1. Go to the "Security" section and click "Edit."

If you want to add a phone number, click Add Verified Phone Number and enter a phone number. Select the method of confirming the number (by text message or automatic phone call) and click Continue. To delete a verified phone number, click next to the phone number you want to delete.

View and manage trusted devices

You can view and manage the list of verified devices in the Devices section of the Apple ID account page.

  1. Go to your Apple ID account page.
  2. Sign in with your Apple ID.
  3. Go to the "Devices" section.

Creating passwords for programs

If you use two-factor authentication, you will be required to sign in to your account from third-party programs and services, such as email programs, contacts or calendars that are not developed by Apple. To create a password for the program, follow these steps:

  1. Log in to your Apple ID account page.
  2. Click the "Create Password" button in the "Application Passwords" section.
  3. Follow the onscreen instructions.

After creating a password for the program, enter or paste it into the password input field in the program in the usual way.

Help and Frequently Asked Questions

Help is needed? You may find the answers to your questions below.

Is this different from Apple’s current two-step verification?

Yes. Two-factor authentication embedded directly in iOS, macOS, tvOS, watchOS and websites apple. It uses other methods of validating verified devices and providing verification codes and optimizes overall performance. Two-factor authentication is required to use certain features that require enhanced security.

What should I do if I do not have access to a trusted device or if a verification code has not been received?

When logging in, when there is no trusted device on hand that displays a confirmation code, the code is sent to the verified phone number via text message or automatic phone call. Click "Code Not Received" on the login screen and choose to send the code to the verified phone number. Also, the code can be obtained directly on the tested device in the Settings menu. .

How do I regain access to my account if I cannot sign in?

If you are unable to sign in, reset your password, or receive confirmation codes, you can. Account recovery is an automatic process that will help you gain access to your account as quickly as possible and prevent possible access by other users allegedly on your behalf. This can take several days - or more - depending on how accurate account information you can provide to verify your identity.

Do I need to remember answers to security questions now?

Not. When using two-factor authentication, you do not need to select security questions and remember the answers to them. Your identity is established exclusively with the password and verification codes sent to your devices and trusted phone numbers. When you start using two-factor authentication, we keep your security questions for two weeks in case you need to return the old security settings to your account. After that, the questions will be deleted.

Can Apple Support help me regain access to my account?

Service apple support  can answer your questions about the account recovery process, but cannot verify your identity or speed up the process in any way.

What are the system requirements for two-factor authentication?

For optimal performance, all devices that are used with an Apple ID must meet these system requirements:

  • an iPhone, iPad, or iPod touch with iOS 9 or later
  • mac OS X El Capitan and iTunes 12.3 or later;
  • Apple Watch with watchOS 2 or later;
  • Apple TV (4th generation) with tvOS;
  • windows computer with established programs  iCloud for Windows 5 and iTunes 12.3.3 or later.

What should I do if I don’t recognize the location shown in the login notification?

When you sign in to a new device, you receive a notification on other verified devices that displays a map with the approximate location of the new device. This is an approximate location based on the IP address of the device you are currently using, not the exact location of the device. The location shown may reflect information about the network you are connected to, and not about the physical location.

If you know that you are the same user who is trying to sign in, but don’t recognize the location shown, you can click “Allow” and continue registration.

However, if you receive a notification that your Apple ID is used to sign in on a new device, and you did not try to sign in, click "Do not allow" to block the attempt to sign in.

What happens if two-factor authentication is used on a device with earlier software versions?

When using two-factor authentication on devices running earlier versions of the OS, you may need to add a six-digit verification code at the end of your password when logging in. on a trusted device running iOS 9 or OS X El Capitan or later, or get it on your verified phone number. Then enter the password by adding a six-digit verification code to it directly in the password field.

Can I turn off two-factor authentication after turning it on?

Two-factor authentication cannot be disabled for some accounts created in iOS 10.3 or macOS Sierra 10.12.4 and later. If you created your Apple ID in earlier versions of iOS or macOS, you can turn off two-factor authentication.

Remember that after turning off two-factor authentication, your account will be protected only with a password and secret questions.

To turn off two-factor authentication, log in to your Apple ID account page and click "Edit" in the "Security" section. Then click Turn Off Two-Factor Authentication. After creating new secret questions  and confirmation of the date of birth, two-factor authentication will be disabled. If there is no item on the Apple ID account page to disable two-factor authentication, then it cannot be disabled.

If someone enables two-factor authentication for Apple ID without your permission, you can also disable it from the message email  with registration confirmation sent to your Apple ID or backup email address. Click Turn Off Two-Factor Authentication at the bottom of the email to restore your previous Apple ID security settings and control your account. The link is active for two weeks after registration.

Publication date: 09/19/2017

Learn what to do if you forgot your iCloud security code for iCloud Keychain.

If you incorrectly entered the iCloud security code too many times when using the iCloud Keychain service, it will be disabled on this device and the keychain in iCloud will be deleted. You can display one of the following messages.

  • “The security code failed to be entered too many times. Verify this iPhone from one of your other devices using the iCloud Keychain. If there are no devices, reset the iCloud Keychain. ”
  • “Too many attempts to enter your iCloud security code. Confirm this Mac from one of your other devices using the iCloud Keychain. If there are no devices, reset the iCloud Keychain. ”

If used, the device is considered trusted when logging in. An iCloud security code is not required to use iCloud Keychain.

If you have access to a trusted device that uses the iCloud Keychain service

You can create a new iCloud security code on another device that also uses the iCloud Keychain service.

On an iPhone, iPad, or iPod touch:

On a Mac with OS X Yosemite or Later

On the device on which the iCloud Keychain service is disabled, create a new iCloud keychain that will contain the username, passwords and other keychain objects on the device:

On the device on which you created the new iCloud security code, a confirmation window will open. Approve adding a new iCloud keychain to your device.

If you don’t have access to a device that uses the iCloud Keychain service

To reset the iCloud Keychain service settings, follow these steps:

To access Apple branded services such as iCloud, App store, iMessage, Facetime, etc. The user of the iOS device needs a personal account called Apple ID. This account consists of a login - it is the email address to which the identifier is attached and the password is set by the user, taking into account a number of security requirements.

At first glance it seems that such a classic login + password protection seems to be enough, but many users think differently. And, in fact, there is cause for concern. Think for yourself, find out someone email address  Nowadays, this is nonsense - we leave it literally everywhere. It’s not so difficult to figure out a password either - various hacking programs that allow you to pick up secret codesToday there is a mass.

Understanding this sad situation, Apple offered the user a new type of protection: for users of old i-devices who cannot upgrade to iOS 9 - a two-step verification, for those who are lucky to have a younger "apple" - two-factor authentication.

In general, both methods of protection are very similar, they suggest that after specifying the login and password of the identifier, the user must also enter a special code. In this article, we will tell you what the Apple ID verification code is, where to enter this code, and how to enable two-step verification / two-factor authentication for your device.

2-step verification

So what is a two-step verification? This is an additional measure of protecting access to Apple branded services - if you enable two-step verification, an attacker will not be able to log into this or that i-service, even in a situation where he knows the username and password of your personal identifier. For access, he will also need a special code.

In particular, a two-step verification protects all unauthorized content purchase services, as well as in iMessage, FaceTime, when trying to enter the Apple ID edit page, cloud service  iCloud - which is especially important, because if an attacker finds himself in your “cloud”, he will not only gain access to all your personal data that you backup, but he will be able to, for example, block your iOS device by turning on the loss mode and demanding money for unlocking.

How do I enable two-step verification?

In order to enable the two-step verification, you need to use this simple guide:



Done! Verification is activated. Now try to log in, for example, to your personal Area on iCloud.com, after entering the login and password, you will need to indicate the code sent to trusted gadgets in a special window. If the entered code does not work, access will be denied, despite the fact that you know the login and password.

An important point! The most reliable scheme is to use a trusted person as a trusted smartphone device and that's why. Imagine that your iPhone was stolen, your Apple ID is recognized and you are trying to log into iCloud to get some confidential information. If you specified the phone number of your iPhone as a trusted one, that is, stolen, then attackers can easily obtain a verification code and bypass a two-step verification. If the code arrives on another device, the scammers will first have to figure out which one and steal it as well.

How to turn off two-step verification?

If for some reason you find that such a “complex” type of access to company services no longer suits you, you can always turn it off, for this:

  1. Follow this link and enter your Apple ID settings account by entering the password and username of your personal account.
  2. Click on the "Security" menu, then "Change."
  3. Select the "Disable 2-step verification" option.
  4. In the next window, you will be asked to indicate your date of birth and verification questions - after you enter these parameters, you can only use the username + password pair to enter all i-services again, but when you enter the Apple ID control panel, you will also need answer the questions asked.

Information on successful disabling two-step verification will come to your e-mail.

Two-factor authentication

Two-factor authentication, as well as two-step verification, is an additional measure of protecting the entrance to Apple-branded services. Only in the situation of working with two-factor authentication does the security mechanism turn out to be more thoughtful and perfect, if you believe the "apple" giant.

How to set up two-factor authentication?

As we said above, two-factor authentication is an option that is not available to all users, but only to those who own mobile i-devices with iOS 9 and more recent versions of the platform loaded on board. Does your gadget meet this requirement? Then we tell how to enable authentication:



That's all! We activated protection, now we need to configure it:

  1. In the window that appears after activating authentication, enter the trusted phone number and a convenient way for you to send the code.
  2. Wait for the code to the specified number.
  3. Tap "Enable ...".

Done! Protection activated. It operates on the principle of a two-stage verification - when trying to enter one or another apple service, you need to enter not only the login and secret cipher ID, but also a special verification code.

Mac owners can activate two-factor authentication using the simple instructions below:

  1. Click on the Apple menu, then System Preferences / iCloud / Account.
  2. Select the "Security" section, click "Enable ..."

Important! On your Mac OS El Capitan must be installed or more fresh version  platforms.

How to turn off two-factor authentication?

In general, the "apple" giant categorically does not recommend disabling protection, but if you decide to do this, you need to go to the Apple ID management page, specify the username, password and verification code, and then select "Edit" / "Turn off ... in the Security submenu. ".

Two-step verification and two-factor authentication: is there any difference?

An attentive reader could not help but wonder - if the work of the above Apple ID security systems is so similar, then what are their differences and why authentication is declared a more advanced mechanism for ensuring user security. Frankly, there is no direct answer to this question.


Apple itself on official page  Support reports something like the following. Allegedly, two-factor authentication is an updated security service that uses more advanced methods of setting trusted devices and sending confirmation codes, as well as optimized work in general.

That is, as you see, the differences seem to be indicated, but nothing is clearly clear. So it remains to trust the company, and if your device supports two-factor authentication, choose this type of protection. In this case, it is important to note that before activating this type of protection, you must first disable the two-step verification, if it was enabled.

To summarize

Well, now you know what two-step verification and two-factor authentication are, how to enable these options and manage them. In addition, you recognize the importance of activating these protection mechanisms. You can read more about two-step verification and two-factor authentication in the "Support" section of the Apple website.