SaaSHub helps you find the best software and product alternatives Learn more →
Google-authenticator Alternatives
Similar projects and alternatives to google-authenticator
-
keepassxc
KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
-
InfluxDB
InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
-
-
ios-application
A native, lightweight and secure one-time-password (OTP) client built for iOS; Raivo OTP!
-
refine
Discontinued Build your React-based CRUD applications, without constraints. [Moved to: https://github.com/refinedev/refine] (by pankod)
-
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
-
-
-
-
-
two-factor-auth
Two Factor Authentication Java code implementing the Time-based One-time Password Algorithm
-
-
tpm2-totp
Attest the trustworthiness of a device against a human using time-based one-time passwords
-
-
-
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
google-authenticator discussion
google-authenticator reviews and mentions
- TOTP Key URI Format
-
Behind the 6-digit code: Building HOTP and TOTP from scratch
Six-digit verification codes for something like a "forgot password" flow are OTPs -- they're only good for one login -- but they are not HOTP/TOTPs. HOTP/TOTP has a registration step, where you copy a server-generated secret to your phone through a QR-code-encoded otpauth:// URI (https://github.com/google/google-authenticator/wiki/Key-Uri-...). That doesn't happen in a "forgot password" flow.
Incidentally, if you think of TOTP as being HMAC(unix mod 30, secret), one idea would be to do public key crypto instead of symmetric HMAC stuff. That's basically what a security key is.
If you additionally made it so that you couldn't phish the security key -- by having the OS + web browser know which apps can ask for which security keys -- you'd have reinvented WebAuthn.
P.S.: Make you sure you have stuffing protection in place against these kinds of six-digit-code auth schemes. A million possibilities is often acceptable for a secondary factor, but it's useless if attackers can just try all million codes.
-
GitHub will disable non-2FA accounts?
otpauth:// is a de-factor standard, since Google Authenticator uses it: https://github.com/google/google-authenticator/wiki/Key-Uri-...
-
Creating 2fa with pyotp
Random question if you're using TOTP why not just give the user the secret when signing up as a Google Authenticator URI encoded in a QR code? Then you won't need to futz around with sending it to them afterwards. You can even use a library like qrcode.js so you don't generate the barcode server side either.
- why are all the totp secrets different styles?
-
Locker: Store secrets on your local file system.
Locker can generate Time Based OTP codes parsing TOTP urls stored under a special key named totp.
-
Does changing an email that has TOTP setup affect the "secret"?
(Examples> https://github.com/google/google-authenticator/wiki/Key-Uri-Format)
- Google Authenticator open source fork archived
- TOTP tokens on my wrist with the smartest dumb watch
- LastPass gehackt, Nutzerdaten aber anscheinend sicher
-
A note from our sponsor - SaaSHub
www.saashub.com | 12 May 2025
Stats
google/google-authenticator is an open source project licensed under Apache License 2.0 which is an OSI approved license.
The primary programming language of google-authenticator is Java.
Popular Comparisons
- google-authenticator VS Aegis
- google-authenticator VS keepassxc
- google-authenticator VS ios-application
- google-authenticator VS pyotp
- google-authenticator VS andOTP
- google-authenticator VS two-factor-auth
- google-authenticator VS otp-codegen
- google-authenticator VS KeePassium
- google-authenticator VS decrypt-otpauth-files
- google-authenticator VS Sensor-Watch