Back in July, we provided you with an overview of Apple’s two-step verification. This is the security method that requires at least two factors of authentication—a password and a trusted device—in order to successfully access an account.
Two-step is a great security method, because it forces one to have physical access to a security key, in this case, an iPhone or an iPad.
Needless to say, we here at iDB highly recommend using 2SV for any account that allows it, Apple ID, or otherwise. In fact, if a service that you’re using doesn’t offer 2SV, I’d seriously think twice about using that service—it’s that important for keeping your data secure.
If you have two-step enabled for your Apple ID, and you should, then you’ve doubtlessly run into the screen that asks you to verify your identify when logging in with your Apple ID. On that screen, it may list some of your Apple devices, and at least one verified phone number. These devices act as security authentication keys.
Have you ever wondered what the requirements are for the devices that are listed here? Have you ever wanted to remove or add a device? In this tutorial, we’ll walk you through managing your iOS trusted devices for two-step verification.