The Basic settings section provides administrators with quick access to the Password Recovery flow, as well as links for setting up Two-step verification and user's access to Less secure apps.
Enabling the Two-step verification (2SV) login flow will require the user to provide a key coming from a registered device in addition to their username and password. Each generated key is only usable once, so without the device, the credentials are not enough to access the account.
You can choose any of the following options for two-step authentication:
- Security Keys that are provided by special devices, usually USB drives that one physically inserts in the machine, or sometimes it's a card that you tap to a Near Field Communication (NFC) or Bluetooth Low Energy (BLE) device. This is the safest option, but also more expensive to implement.
- A Google Prompt that...