{"id":1413,"date":"2023-05-18T08:30:00","date_gmt":"2023-05-18T08:30:00","guid":{"rendered":"https:\/\/proget.pl\/en\/?p=1413"},"modified":"2025-06-09T09:00:55","modified_gmt":"2025-06-09T09:00:55","slug":"two-factor-authentication-proget-console","status":"publish","type":"post","link":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/","title":{"rendered":"Two-factor authentication: why is it important and how to enable it in Proget"},"content":{"rendered":"<div class=\"!my-16 md:!my-24\">\n  <div \n    class=\"is-layout-constrained\" style=\"--wp--style--global--content-size: 70.75rem;\"\n>\n    <main class=\"xl:grid xl:gap-10 xl:grid-cols-[741px_1fr]\">\n      <article>\n                  <div class=\"inline-grid grid-cols-2 gap-5 sm:flex sm:flex-wrap mb-3\">\n                          <a class=\"uppercase text-[10px] leading-3 text-text-tertiary font-medium w-fit hover:no-underline\"\n                 href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\"\n              >\n                Cyber smart\n              <\/a>\n                      <\/div>\n                          <h1 class=\"font-[600] text-3xl text-text-primary mb-7 md:mb-12\">Two-factor authentication: why is it important and how to enable it in Proget<\/h1>\n                <div class=\"flex items-center gap-x-8\">\n                      <div class=\"flex items-center gap-x-1.5\">\n                              <div class=\"shrink-0\">\n                  <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Magda-M-100.webp\" class=\"w-8 h-8 object-cover rounded-full\" alt=\"\" \/>                <\/div>\n                                            <p class=\"text-xs\">Magdalena Martens<\/p>\n                          <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M19.5 3.75h-15a.75.75 0 0 0-.75.75v15c0 .414.336.75.75.75h15a.75.75 0 0 0 .75-.75v-15a.75.75 0 0 0-.75-.75Zm-3-1.5v3m-9-3v3m-3.75 3h16.5\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">18.05.2023<\/p>\n            <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-miterlimit=\"10\" d=\"M12 21a9 9 0 1 0 0-18 9 9 0 0 0 0 18Z\"\/><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M12 6.75V12h5.25\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">\n                2 min\n              <\/p>\n            <\/div>\n                  <\/div>\n        <div class=\"mt-7 md:mt-12 single-post-content\">\n          \n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/proget.pl\/en\/\">Proget<\/a><\/span> &gt; <span><a href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\">Cyber smart<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\"><strong>Two-factor authentication: why is it important and how to enable it in Proget<\/strong><\/span><\/span><\/div>\n\n\n<p class=\"has-2-xl-font-size\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">In today&#8217;s digital world, where data security is a crucial challenge, two-factor authentication (2FA) has become an essential tool for protecting online accounts effectively.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">2FA is a process that requires two independent elements to confirm a user&#8217;s identity, usually something the user knows (such as a password) and something the user has (such as a code generated by a smartphone app).<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-additional-layer-of-protection-for-your-account\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Additional layer of protection for your account<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">The undoubted benefit of two-factor authentication is the increased level of security. Using only one password for verification can be risky, as data thieves or hackers can intercept this information and gain unauthorized access to our accounts. By enabling 2FA, a hacker who knows our password will not be able to access our account without access to our phone. The likelihood that they will have both elements, as well as our phone password and the password for the authentication application, is low.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-how-does-two-factor-authentication-work\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">How does two-factor authentication work?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">There are many ways to implement two-factor authentication: SMS, email with a verification code, an authorization app, or a physical device. For authorization apps, such as Google Authenticator or Microsoft Authenticator, the user downloads the app to their smartphone and then links it to their account, generating a unique authentication code required when logging in. This method is convenient and secure, as the code generated on our device is only valid for 30 seconds.<\/p>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Using two-factor authentication is easy, mostly free, and brings undeniable benefits to all online account users, especially for accounts containing sensitive information \u2013 these include bank accounts, email or accounts on social media platforms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-how-to-enable-two-factor-authentication-in-the-proget-console\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">How to enable two-factor authentication in the Proget console?<\/h2>\n\n\n\n<ol style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li>Go to the &#8216;Settings&#8217; tab, then select &#8216;Roles&#8217; from the side menu bar.<\/li>\n\n\n\n<li>Click &#8216;Add&#8217; or select a role from the list and click &#8216;Edit&#8217;.<\/li>\n\n\n\n<li>In the &#8216;Update role&#8217; window, check the &#8216;Enable two-factor authentication&#8217; option and save your changes at the bottom of the window.<\/li>\n\n\n\n<li>The next time you log into the console, you will see a QR code on the screen.<\/li>\n\n\n\n<li>Scan it in an authentication application (such as Google Authenticator). The automatically created profile, referring to your Proget console account, will generate one-time password codes \u2013 valid for 30 seconds.<\/li>\n\n\n\n<li>Enter the one-time code generated in the Proget console login window.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">In the meantime, it is worth remembering that 2FA significantly increases security but does not guarantee 100% protection against attacks. Therefore, it is also essential to maintain a solid and unique password and regularly update the software.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-brand-fog-color has-alpha-channel-opacity has-brand-fog-background-color has-background is-style-default\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:0\" \/>\n\n\n\n<div class=\"wp-block-group has-base-white-background-color has-background is-nowrap is-layout-flex wp-container-core-group-is-layout-837611ba wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:0;padding-top:0;padding-right:var(--wp--preset--spacing--sm);padding-bottom:0;padding-left:var(--wp--preset--spacing--sm)\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-700cb50f wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-f078265f wp-block-column-is-layout-constrained\" style=\"padding-right:0;flex-basis:48px\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Magda-M-100.webp\" alt=\"\" class=\"wp-image-2977\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-e1564d08 wp-block-column-is-layout-constrained\" style=\"padding-left:0\">\n<p>Author: Magdalena Martens<\/p>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0.7em;font-size:0.7em\">Marketing manager with many years of experience, specializing in B2B communications in IT. Involved in the cyber security and Mobile Device Management (MDM) solutions topics for several years. Privately a fan of automotive and Kaizen philosophy.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n        <\/div>\n      <\/article>\n      <aside class=\"mt-10 xl:mt-0\">\n        <div class=\"hidden xl:block xl:mb-10\">\n          <form role=\"search\" action=\"https:\/\/proget.pl\/en\/blog\/\" autocomplete=\"off\">\n  <div class=\"w-full inline-block relative \">\n    <input\n      class=\"peer w-full bg-transparent text-text-primary font-medium text-sm shadow-01 pr-3 pl-10 pt-xs border border-border-secondary rounded-lg transition-all hover:border-border-active hover:bg-surface-hover-01 focus:border-border-active focus:outline-0 focus:ring-0 disabled:bg-border-disabled disabled:text-text-disabled disabled:cursor-not-allowed disabled:border-border-disabled h-[50px]\"\n      placeholder=\" \"\n      type=\"text\"\n      name=\"s\"\n      value=\"\"\n      id=\"search\"\n    \/>\n    <label\n      class=\"flex w-full h-full select-none pointer-events-none absolute left-0 pr-3 pl-10 transition-all !overflow-visible truncate leading-tigh text-text-tertiary peer-placeholder-shown:text-text-tertiary peer-disabled:text-text-disabled peer-disabled:peer-placeholder-shown:text-text-disabled peer-placeholder-shown:text-sm text-xs peer-focus:text-xs top-[7px] peer-placeholder-shown:top-[15px] peer-focus:top-[7px]\"\n      for=\"search\"\n    >\n      Search\n    <\/label>\n    <button type=\"submit\" class=\"absolute left-0 top-[calc(50%-20px)] w-10 h-[40px] pl-1 flex items-center justify-center\">\n      <svg class=\"w-5 h-5 shrink-0 stroke-primary-500 pointer-events-none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 20 20\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M9.063 15.625a6.562 6.562 0 1 0 0-13.125 6.562 6.562 0 0 0 0 13.125Zm4.64-1.922L17.5 17.5\"\/><\/svg>    <\/button>\n  <\/div>\n<\/form>\n        <\/div>\n                  <h2 class=\"text-text-secondary text-lg font-semibold mb-6\">More articles:<\/h2>\n          <div class=\"grid gap-6\">\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and padlocked shield icon, cogs, tile with password stars\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Cyber hygiene in business \u2013 learn the simple rules and how you can support it\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/byod-cyod-cope-cobo-cosu\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/03\/3-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop screen and tiles, BYOD CYOD COSU COBO COPE mobility management policies\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    BYOD, CYOD, COPE, COBO, COSU \u2013 and MDM system to implement them\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/does-your-company-need-mdm\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/7-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with a laptop and a shield icon with MDM written on it\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Check if your company also needs a professional MDM solution\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/choosing-mdm-solution\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/37-mdm_03-EN-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and graphics, Proget MDM signpost, price, features, support, All-in-One\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    What to consider when choosing an MDM solution? \u2013 explore practical tips\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/proget-iso-27001-certificate\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/08\/17-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and ISO 27001 logo\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Do you know why you should bet on an ISO 27001- and 9001-certified provider?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                      <\/div>\n              <\/aside>\n    <\/main>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital world, where data security is a crucial challenge, two-factor authentication (2FA) has become an essential tool for protecting online accounts effectively. 2FA is a process that requires two independent elements to confirm a user&#8217;s identity, usually something the user knows (such as a password) and something the user has (such as a code generated by a smartphone app). The undoubted benefit of two-factor authentication is the increased level of security. Using only one password for verification can be risky, as data thieves or hackers can intercept this information and gain unauthorized access to our accounts. By enabling 2FA, a hacker who knows our password will not be able to access our account without access to our phone. The likelihood that they will have both elements, as well as our phone password and the password for the authentication application, is low.<\/p>\n","protected":false},"author":3,"featured_media":2740,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-1413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersmart"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Two-factor authentication: why is it important and how to enable it in Proget | Proget<\/title>\n<meta name=\"description\" content=\"Learn the advantages of two-factor authentication and why you should use it. Increase the security of your online accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two-factor authentication: why is it important and how to enable it in Proget\" \/>\n<meta property=\"og:description\" content=\"Learn the advantages of two-factor authentication and why you should use it. Increase the security of your online accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\" \/>\n<meta property=\"og:site_name\" content=\"Proget\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-18T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T09:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1351\" \/>\n\t<meta property=\"og:image:height\" content=\"296\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Agnieszka Pierlak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka Pierlak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\"},\"author\":{\"name\":\"Agnieszka Pierlak\",\"@id\":\"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539\"},\"headline\":\"Two-factor authentication: why is it important and how to enable it in Proget\",\"datePublished\":\"2023-05-18T08:30:00+00:00\",\"dateModified\":\"2025-06-09T09:00:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\/\/proget.pl\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp\",\"articleSection\":[\"Cyber smart\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\",\"url\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\",\"name\":\"Two-factor authentication: why is it important and how to enable it in Proget | Proget\",\"isPartOf\":{\"@id\":\"https:\/\/proget.pl\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp\",\"datePublished\":\"2023-05-18T08:30:00+00:00\",\"dateModified\":\"2025-06-09T09:00:55+00:00\",\"description\":\"Learn the advantages of two-factor authentication and why you should use it. Increase the security of your online accounts.\",\"breadcrumb\":{\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage\",\"url\":\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp\",\"contentUrl\":\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp\",\"width\":1351,\"height\":296,\"caption\":\"banner with laptop and shield icon with the word 2FA, tile with password stars\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Proget\",\"item\":\"https:\/\/proget.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber smart\",\"item\":\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Two-factor authentication: why is it important and how to enable it in Proget\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proget.pl\/en\/#website\",\"url\":\"https:\/\/proget.pl\/en\/\",\"name\":\"Proget\",\"description\":\"Enterprise Mobility Management\",\"publisher\":{\"@id\":\"https:\/\/proget.pl\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proget.pl\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proget.pl\/en\/#organization\",\"name\":\"Proget Sp. z o.o.\",\"alternateName\":\"Proget\",\"url\":\"https:\/\/proget.pl\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg\",\"contentUrl\":\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg\",\"width\":1,\"height\":1,\"caption\":\"Proget Sp. z o.o.\"},\"image\":{\"@id\":\"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/proget-software\/\"],\"description\":\"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.\",\"legalName\":\"Proget Sp. z o.o.\",\"foundingDate\":\"2012-03-27\",\"taxID\":\"5472142508\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539\",\"name\":\"Agnieszka Pierlak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proget.pl\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"caption\":\"Agnieszka Pierlak\"},\"description\":\"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.\",\"url\":\"https:\/\/proget.pl\/en\/blog\/author\/apierlak\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Two-factor authentication: why is it important and how to enable it in Proget | Proget","description":"Learn the advantages of two-factor authentication and why you should use it. Increase the security of your online accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/","og_locale":"en_GB","og_type":"article","og_title":"Two-factor authentication: why is it important and how to enable it in Proget","og_description":"Learn the advantages of two-factor authentication and why you should use it. Increase the security of your online accounts.","og_url":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/","og_site_name":"Proget","article_published_time":"2023-05-18T08:30:00+00:00","article_modified_time":"2025-06-09T09:00:55+00:00","og_image":[{"width":1351,"height":296,"url":"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp","type":"image\/webp"}],"author":"Agnieszka Pierlak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka Pierlak","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#article","isPartOf":{"@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/"},"author":{"name":"Agnieszka Pierlak","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539"},"headline":"Two-factor authentication: why is it important and how to enable it in Proget","datePublished":"2023-05-18T08:30:00+00:00","dateModified":"2025-06-09T09:00:55+00:00","mainEntityOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/"},"wordCount":423,"publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp","articleSection":["Cyber smart"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/","url":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/","name":"Two-factor authentication: why is it important and how to enable it in Proget | Proget","isPartOf":{"@id":"https:\/\/proget.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp","datePublished":"2023-05-18T08:30:00+00:00","dateModified":"2025-06-09T09:00:55+00:00","description":"Learn the advantages of two-factor authentication and why you should use it. Increase the security of your online accounts.","breadcrumb":{"@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#primaryimage","url":"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2023\/05\/13.webp","width":1351,"height":296,"caption":"banner with laptop and shield icon with the word 2FA, tile with password stars"},{"@type":"BreadcrumbList","@id":"https:\/\/proget.pl\/en\/blog\/two-factor-authentication-proget-console\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Proget","item":"https:\/\/proget.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber smart","item":"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/"},{"@type":"ListItem","position":3,"name":"Two-factor authentication: why is it important and how to enable it in Proget"}]},{"@type":"WebSite","@id":"https:\/\/proget.pl\/en\/#website","url":"https:\/\/proget.pl\/en\/","name":"Proget","description":"Enterprise Mobility Management","publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proget.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proget.pl\/en\/#organization","name":"Proget Sp. z o.o.","alternateName":"Proget","url":"https:\/\/proget.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","width":1,"height":1,"caption":"Proget Sp. z o.o."},"image":{"@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/proget-software\/"],"description":"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.","legalName":"Proget Sp. z o.o.","foundingDate":"2012-03-27","taxID":"5472142508"},{"@type":"Person","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539","name":"Agnieszka Pierlak","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","caption":"Agnieszka Pierlak"},"description":"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.","url":"https:\/\/proget.pl\/en\/blog\/author\/apierlak\/"}]}},"_links":{"self":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/comments?post=1413"}],"version-history":[{"count":10,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1413\/revisions"}],"predecessor-version":[{"id":3010,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1413\/revisions\/3010"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media\/2740"}],"wp:attachment":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media?parent=1413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/categories?post=1413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/tags?post=1413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}