Announcements

Introducing Two-Factor Authentication (2FA).

Written by Tomas Koprusak 116 words | 1 min read Updated Nov 13, 2025
0%

Here is a small and handy addition for having an extra level of security for the accounts.

Two-factor authentication is a widely-used mechanism for making sure that the account is only reachable by you and Uptime Robot now supports it.

Two factor authentication

The feature can be found at My Settings>Two-Factor Authentication (2FA) menu and you can choose to use your favorite authenticator app like Google Authenticator, Authy.. for activating it.

Once activated, the login pages will ask for the authentication code (besides the password) which can only be generated with your authenticator app (and, we are working on adding this feature to various other actions besides the login).

Hope that it helps for a better experience :).

Start using UptimeRobot today.

Join more than 2M+ users and companies!

  • Get 50 monitors for free - forever!
  • Monitor your website, server, SSL certificates, domains, and more.
  • Create customizable status pages.

Written by

Tomas Koprusak

Product Owner |

He has worked for Sygic as a marketer and co-led the implementation and development of a product acquired from a competitor. He has also worked as a freelance developer, helping clients from various areas. Tomas brings a wealth of industry experience to our team. He spent a few years in the blockchain industry, leading projects and marketing teams at multiple blockchain-based companies. He has presented products and managed deals in more than 10 countries around the world, managed the ICO, and built a successful marketing team at Fuergy that continues to thrive. Tomas managed a product team for the biggest job site in Slovakia, covering development and transformation to a new B2B app. Not only is Tomas skilled at web development, but he also has a deep understanding of SaaS businesses, which makes him an invaluable asset in shaping and leading various projects at UptimeRobot. His focus is always on the continual improvement of our service and user experience. In addition to his professional achievements, Tomas is a devoted father. His personal interests include cycling (he traveled around the whole country of Slovakia), playing guitar (he even played in a band), servicing bikes, music, and enjoying good beer.

46 responses to “Introducing Two-Factor Authentication (2FA)”

  1. This is very good news, but for our enterprise use we would prefer being able to associate multiple U2F security keys, as many systems like Google currently allow.

    Also: what about backup mechanisms (SMS, static “backup codes”, etc.)? Is the only backup/safeguard option to save a copy of the initial secret key and use it to configure a new TOTP device?

    Thanks!

  2. Happy to see 2FA being rolled out! There is one small issue, you dont currently provide the key with the barcode. This is needed for two reasons, a) if you are setting up 2FA from your mobile phone, it isnt possible to scan the barcode. And b) people need to be able to save the key in order to restore their token in the event that they lose/replace/wipe their mobile device.

  3. Thank you for adding support for the best form of 2FA out there (Google Authenticator).

    I’ve been through the nightmare of having lost my 2FA device before and know how painful it is with all of the challenges involved with resetting a 2FA link, so I always immediately back up my secret random string (that’s part of every 2FA setup). I’m sure many others aren’t as diligent when setting it up and will eventually lose their 2FA device. Your way of setting up a secret security question+answer is an excellent solution to the lost 2FA device problem. Kudos to UptimeRobot’s development team.

    UptimeRobot is an awesome product all around. Thanks for everything. You guys rock!

  4. That’s awesome, thanks!

    Would be nice to see Webauthn as well – tapping a security key is a lot faster than having to type out codes. Having multiple second factors would also let us avoid having to create fallback security questions.

  5. While 2FA is great in this case – it would be great if you allowed SAML login access to the platform as well. That would be a great additional layer of identity security in terms of accessing uptime robot in an enterprise environment.

  6. Wait. You replaced the password with the token? You took away a factor. It’s one factor authentication.

    Also, no option to use a text code to add to an Authenticator app? QR code only?

    Who implemented this? You’ve made your system massively more unsecure

  7. Hi! Thanks for adding this, but there are no backup codes I see. Will you add support for it?

  8. Hey,
    It would be nice to actually have multiple users that can login in the company platform.

    Nice feature nevertheless

  9. What’s the process for account recovery if I lose access to my phone or code-generator?

  10. Hi Uptime Robot Team,

    First off, you are doing an amazing job and I love the product!! Also, thank you for making it possible to use an app instead of SMS, I much prefer this method.

    I want to bring awareness to FreeOTP as another alternative to Google Authenticator and Authy. It is often left out of 2FA software discussions, yet it is a free and open source option that is just as powerful as its competitors.

    https://freeotp.github.io/

    All the best,
    Jason
    Absorbing Chaos LLC

  11. I understand that this service might not be high risk, but this implementation of 2FA is bad. It is stupid to not only allow anyone, who can answer the security question, to remove 2FA, but requiring users to set one as well, effectively undermining the 2FA entirely. Furthermore, the security questions encourage users to use potentially public or inconsistent/unstable information as their “secondary password”. Generate random recovery codes instead like any decent 2FA implementation.

  12. Furthermore, you ask the user which question they selected when they activated 2FA. So if the users do as they are encouraged to and answer truthfully, they still either have to write down the security question (???) or brute force their way in if they lose their 2FA key.

  13. A bit late perhaps, but it’s never *too* late to improve security. Glad you’ve added support!

  14. Is there any plans for SSO through Azure AD? 2FA is awesome, but it would be even better if we could integrate sign in rules through Azure AD. Most applications now are allowing SSO for one screen login to all enterprise applications.

  15. Hi John,

    in that case, I am sure you will be able to solve it with our customer support!

  16. This is great news for us to protect our accounts! Do you guys also the one who made the steam authenticator?

  17. You could add an “Signal” notification bot or maybe also WA but I don’t know how WA supports Bots.

  18. Hi there,

    thank you for your feedback! We are already thinking about Signal.

  19. Thank you for your feedback! 🙂 Could you please specify what you mean?

  20. Hi Stephen, this is not planned yet, but thank you for the idea! We will reconsider it.

  21. Hi Niklas,

    thank you for your feedback, we will reconsider it, there are more changes planned now 🙂

  22. Hi Jason,

    thank you for your feedback, we appreciate it!

  23. Hi Jonathan, thank you for your feedback, we will reconsider it, there are more changes planned at the moment.

  24. Hi there,

    thank you for your feedback! This feature is already planned and will be added soon 🙂

  25. Hi Martin,

    thank you for reaching out to us, there are more changes planned at the moment, we will reconsider the 2FA in the future too, so stay tuned! 🙂

  26. Hi Marques,

    thank you for your feedback! We will reconsider it.

  27. Thank you for the suggestion, we will reconsider it in the future 🙂

  28. Thank you for your feedback, Alex! We appreciate it and will reconsider it in the future 🙂

  29. Hi Peter,

    thank you for your feedback, we will reconsider it. For now, unfortunately, there are no other backup options.

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Articles

Recent Articles

Table of Contents