Frequently Asked Questions
Find answers to common questions about TOTP generators and two-factor authentication
TOTP Basics
TOTP stands for "Time-Based One-Time Password." It's a security algorithm that generates unique, temporary passwords that change every 30 seconds. TOTP is widely used for two-factor authentication (2FA) to add an extra layer of security to your online accounts.
Unlike static passwords, TOTP codes are only valid for a short time window, making them extremely secure even if intercepted by attackers.
TOTP offers several advantages over SMS-based 2FA:
- Works offline: No cellular or internet connection required
- More secure: Not vulnerable to SIM swapping or SMS interception
- Faster: Instant code generation without waiting for text messages
- More reliable: No dependency on carrier networks or signal strength
- Private: No phone number sharing with services
Most major online services support TOTP, including:
- Social Media: Facebook, Twitter, Instagram, LinkedIn, Reddit
- Cloud Services: Google, Microsoft, Dropbox, iCloud
- Financial: Most banks, PayPal, cryptocurrency exchanges
- Developer Tools: GitHub, GitLab, AWS, Azure
- Gaming: Steam, Battle.net, Epic Games
- Productivity: Slack, Discord, Zoom, Atlassian
Setup & Configuration
Setting up TOTP typically follows these steps:
- Go to your account's security or 2FA settings
- Choose "Authenticator app" or "TOTP" option
- Scan the QR code with your authenticator app or manually enter the secret key
- Enter the 6-digit code from your app to verify setup
- Save the provided backup codes in a secure location
Pro Tip: Always save your backup codes and consider storing the secret key securely for account recovery purposes.
Popular and reliable authenticator apps include:
- Google Authenticator: Simple, widely supported
- Authy: Cloud backup, multi-device sync
- Microsoft Authenticator: Integrated with Microsoft services
- 1Password: Built into password manager
- Bitwarden: Open source with premium features
- LastPass Authenticator: Free with backup options
Choose based on your needs for backup, sync, and integration with other tools.
Yes, you can use the same secret key on multiple devices, and they will all generate identical TOTP codes. This is useful for:
- Having backup devices in case your primary device is lost
- Using TOTP on both phone and computer
- Sharing access in team environments (though this reduces security)
Security Note: Each additional device with the secret key increases your attack surface. Only add the key to devices you fully control and trust.
Troubleshooting
Common solutions for non-working TOTP codes:
- Check time sync: Ensure your device clock is accurate (TOTP is time-sensitive)
- Wait for new code: Don't use codes at the very end of their 30-second window
- Verify secret key: Make sure you entered the correct secret key
- Check settings: Confirm you're using 6 digits and 30-second intervals
- Try previous/next code: Some services accept codes from adjacent time windows
- Use backup codes: If nothing else works, use your saved backup codes
Recovery options depend on your preparation:
- Backup codes: Use the backup codes you saved during TOTP setup
- Alternative device: If you set up TOTP on multiple devices
- Cloud backup: Some apps like Authy offer cloud recovery
- Account recovery: Contact support with identity verification
- Saved secret keys: If you stored the original secret keys securely
Prevention: Always save backup codes and consider using an authenticator app with cloud backup features for easier recovery.
Time synchronization issues can cause TOTP codes to appear out of sync:
- Device clock drift: Your device's clock may be slightly off
- Time zone issues: TOTP uses UTC, not local time
- Network delays: Manual time sync may have delays
Solutions:
- Enable automatic time synchronization in your device settings
- Manually sync time with network time servers
- Wait for the next code cycle if timing seems off
- Use codes from the middle of their validity window
While TOTP supports different time periods, most services use the standard 30-second interval. You can technically use other periods like 60 seconds or 15 seconds, but:
- Compatibility: The service must support your chosen time period
- Security trade-offs: Longer periods reduce security, shorter periods reduce usability
- Standard compliance: 30 seconds is the RFC 6238 default
Our generator allows you to experiment with different time periods for testing purposes.
Security
TOTP is one of the most secure 2FA methods available:
- Very secure: Hardware security keys (FIDO2/WebAuthn)
- Highly secure: TOTP authenticator apps
- Moderately secure: SMS/voice calls
- Less secure: Email-based codes
TOTP provides excellent security because codes are generated locally, change frequently, and don't rely on potentially vulnerable communication channels.
Online TOTP generators can be safe if they meet certain criteria:
- Client-side generation: All calculations happen in your browser
- No data transmission: Secret keys never leave your device
- Open source code: Transparent implementation you can verify
- HTTPS encryption: Secure connection to the website
Our Security: This TOTP generator runs entirely in your browser. Your secret keys are never transmitted to our servers or stored anywhere online.
If your TOTP secret key is compromised:
- Immediate risk: Attacker can generate valid TOTP codes
- Account access: Combined with your password, they could access your account
- Ongoing threat: The key remains valid until you disable 2FA
Immediate actions to take:
- Change your account password immediately
- Disable and re-enable 2FA to get a new secret key
- Check account activity for unauthorized access
- Update any backup locations where the old key was stored
Backing up secret keys involves security trade-offs:
Benefits:
- Easy recovery if you lose your device
- Can set up TOTP on multiple devices
- Reduces dependency on service-provided backup codes
Risks:
- Additional attack surface if backup is compromised
- Backup storage becomes a high-value target
- Need to secure backup location properly
Best Practice: If you backup secret keys, use encrypted storage and treat them with the same security as passwords. Consider using a reputable password manager.
Technical Questions
The number of digits affects security and usability:
- 6 digits: 1 million possible combinations (10^6)
- 8 digits: 100 million possible combinations (10^8)
Security implications:
- 8-digit codes are 100x harder to guess by brute force
- Both are secure given the 30-second validity window
- 6-digit codes are the standard and most widely supported
Most services use 6-digit codes as they provide sufficient security while remaining user-friendly.
Yes! TOTP is designed to work completely offline:
- No internet required: Codes are generated locally using time and the secret key
- Synchronized clocks: Only requires accurate time on both client and server
- Perfect for travel: Works in airplane mode or areas with poor connectivity
This offline capability is one of TOTP's major advantages over SMS-based 2FA, which requires cellular connectivity.
TOTP secret keys use Base32 encoding (RFC 4648):
- Character set: A-Z and 2-7 (32 characters total)
- Case insensitive: More user-friendly than Base64
- No confusing characters: Avoids 0, 1, 8, 9 to prevent confusion
Example: JBSWY3DPEHPK3PXP
This encoding makes secret keys easier to manually enter while maintaining good entropy for security.
Still Have Questions?
Can't find the answer you're looking for? We're here to help with your TOTP and 2FA questions.
Contact Support