Support: Operation authentication

Return to the main category

What is operation authentication?

Operation authentication is additional protection of sensitive operations on your account through codes transmitted via e-mails, text messages or by an application on your mobile phone. Thanks to the operation authentication, if someone gets your account password and [...]

Read more » | User feedback: 3.3

Why do some operations require authentication?

The requirement to authenticate sensitive operations on your account increases security on your account. If an unauthorized person managed to obtain your account password, he or she could log in and take control of your domains. Operation authentication is an additional [...]

Read more » | Viewed: 1 time | User feedback: 5.0

How to change the operation authentication method?

To change the authentication method in your account, select Account > Authentication method on the website menu. From the list, select the new authentication method you want to use and press the Check operation details button. If this is the first time you are changing [...]

Read more » | User feedback: 2.5

Which operations require authentication?

By default, the following operations require additional authentication in your account: Retrieving a domain AuthInfo code. Pushing a domain to another account. Deleting a domain. The requirement to authenticate these operations prevents you from losing domains if [...]

Read more » | User feedback: 3.3

Can I make authentication required for other operations?

To change the list of operations that require authentication, select Account > Authentication settings on the website menu. Select operations from the "Operations requiring authentication" list and press the Change settings button. The change must be authenticated using [...]

Read more » | Viewed: 1 time | User feedback: 3.3

Can I make authentication required for some domains?

You can change the method of authentication of the operations for specific domains in your account (for example, from particularly valuable domains that you want to protect from being transferred and sold). For this purpose, there are so-called security schemes for [...]

Read more » | Viewed: 3 times | User feedback: 5.0

Can I authenticate the operation later?

The code used to authenticate an operation is valid for one hour. If at the moment you don't want to authenticate an operation, you can do so later but before the code expires. To do this, select Account > Operations to be authenticated on the website menu. Find the [...]

Read more » | User feedback: 5.0

What authentication methods are available?

You can choose one of the three methods to authenticate operations on your account: One-time codes sent by e-mail. This is the default authorization method for doing an operation. One-time codes sent by text messages. To use this method, you need to add a mobile phone [...]

Read more » | Viewed: 127 times | User feedback: 3.3

Which one is the best authentication method?

Each authentication method has its advantages and disadvantages. Usually, greater safety of a given method is associated with the less convenient use of it. Therefore, you should choose the one that suits your needs best: Authentication via e-mail is the most convenient [...]

Read more » | User feedback: 3.3

I haven't received the message with the authentication code, what should I do?

If you haven't received an e-mail or text message with a code to authenticate the operation, you can send it again. To do this, select Account > Operations to be authenticated on the website menu. Find the selected operation on the list and point the mouse cursor to a [...]

Read more » | User feedback: 5.0

The Google Authenticator password is not accepted, what should I do?

If you receive a message from Google Authenticator saying that the password is incorrect, you should, after rewriting the password, check the date and time settings on your mobile phone. Passwords are generated based on the current time, so if the time on your phone is [...]

Read more » | User feedback: 5.0

How to protect the account against the loss of the phone number used to authenticate operations?

If you enable authentication via text messages or Google Authenticator in your account, the loss of your phone will make it impossible for you to perform operations that require authentication. In order to protect yourself from this situation, write down and keep in a [...]

Read more » | Viewed: 1 time | User feedback: 5.0

I have lost the phone used to authenticate operations, what should I do?

If you have lost your phone on which you received text messages with authentication codes or on which you installed Google Authenticator, you can reset the authentication method. This will restore the e-mail messaging as an authentication method so that you could then [...]

Read more » | Viewed: 1 time | User feedback: 5.0

My account was blocked after I entered the authentication code incorrectly, what do I do now?

If you mistype the operation authentication code five times, your account will be blocked for one hour. This means that no operation requiring authentication can be performed during that time. This blocking is intended to protect your account against unauthorized access, [...]

Read more » | Viewed: 1 time | User feedback: 2.5

Didn't found answers to your questions on our website?

Contact us to get help from our experts:

Contact us Send message  

Confirm the operation
Are you sure?
Suggestion :