Since the start of the year 2020, the Zoom video conferencing app made it to the news multiple times for various security lapses. Though, the vendors have acted proactively to address the issues and improve app security. Continuing this practice, Zoom has now launched two-factor authentication for all accounts in a bid to prevent security breaches.
Zoom Launched Two-Factor Authentication
In a recent blog post, Zoom announced the launch of two-factor authentication for all users. With this feature, Zoom attempts to protect the users from potential security breaches.
Hence, onward, Zoom users will have the liberty to apply an additional security layer to their account. This will effectively provide them protection against brute-forcing and other attacks involving credentials.
For this, Zoom offers support for various authentication methods, such as SAML, OAuth, and/or password-based authentication. Users can turn on this feature and add additional security either via an authenticator app, or verification codes. As Zoom explains,
With Zoom’s 2FA, users have the option to use authentication apps that support Time-Based One-Time Password (TOTP) protocol (such as Google Authenticator, Microsoft Authenticator, and FreeOTP), or have Zoom send a code via SMS or phone call, as the second factor of the account authentication process.
Enabling 2FA In Zoom
With the new feature, a Zoom account admin can add 2FA for users. Such as, the admin can either apply 2FA to all accounts, to the users in a specified group, or for specific user roles.
To activate, an admin can simply go to the ‘Advanced’ option in the navigation menu, click on ‘Security’, and enable Sign in with Two-Factor Authentication option. After that, the admin can choose to apply 2FA for the user(s) accordingly.
For details, users can visit the Zoom support page.
This feature has arrived shortly after Zoom fixed a vulnerability that existed due to unlimited password attempts to join Zoom Meetings. This flaw exposed Private Meetings to intruders.
Let us know your thoughts in the comments.