Multifactor authentication (MFA) is one of the most effective ways to enhance security, and with the rise of apps such as Google Authenticator, the authentication method has become easier to deploy.
However, whether due to privacy concerns, a lack of updates (especially when it comes to open-source options), or preference, many choose to avoid Google Authenticator.
Fortunately, there’s no shortage of competitors on the market, each with distinct advantages. Here are some of the top Google Authenticator alternatives.
Dashlane
Employees per Company Size
Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)
Micro (0-49 Employees), Medium (250-999 Employees), Enterprise (5,000+ Employees), Large (1,000-4,999 Employees), Small (50-249 Employees)
Micro, Medium, Enterprise, Large, Small
Features
Automated Provisioning
ManageEngine ADSelfService Plus
Employees per Company Size
Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)
Any Company Size
Any Company Size
Features
Access Management, Compliance Management, Credential Management, and more
Top Google Authenticator alternatives: Comparison table
Product name | Pricing | Key Features |
---|---|---|
Microsoft Authenticator: Best for a “big-name” option | Free |
|
Twilio Authy: Best for backups and multiple devices | 5 cents per successful verification plus standard fees per channel |
|
Cisco Duo: Best for enterprises | Free up to 10 users Essentials: $3 per user, per month Advantage: $6 per user, per month Premium: $9 per user, per month |
|
Yubico Security Key: Best for a physical security key | Yubico security keys are available in different models and configurations, each with varying prices. The pricing depends on factors like the model, connectivity―such as USB-A, USB-C, and near-field communication (NFC)―and features of the security key |
|
FreeOTP: Best for an open-source alternative | Free |
|
Microsoft Authenticator: Best for a ‘big-name’ option
For those looking for a recognized and well-known provider, I recommend Microsoft Authenticator. Available for both Android and iOS, Microsoft Authenticator offers a similar experience to Google’s, working with both Microsoft and non-Microsoft accounts.
No passwords are required. Accounts are accessible using a PIN code, fingerprint, or face recognition. I personally like how there’s an option to back up credentials to the cloud, but this requires a personal Microsoft account, with iOS users also needing to link to an iCloud account.
Recent notable improvements Microsoft has made include the ability to now display the name of the service, website, or application being accessed. This serves as an additional layer of security you can use to confirm the authenticity of an MFA request.
Why I chose Microsoft Authenticator
As a large, established company, I feel Microsoft and the Microsoft Authenticator team can provide a robust level of support for users who have questions or issues with the product. It also can provide a consistent level of updates to provide new features and patch bugs with the software.
Pricing
- Free and available for download from Apple Store or Google Play Store.
Features
- Provides 2FA.
- Provides passwordless sign-in.
- Supports push notifications.
- Supports MFA.
Microsoft Authenticator pros and cons
Pros | Cons |
---|---|
2FA and MFA provide an extra layer of security. | Not all services support Microsoft Authentication for 2FA or MFA, which limits its usage. |
Easy to use with Microsoft accounts and other supported services. | Users must have the app installed on their mobile device to use 2FA or MFA, which creates complications if the device is lost or unavailable. |
User-friendly interface with push notification approval for MFA. | |
Supports various authentication methods, including biometrics and phone sign-in. |
Twilio Authy: Best for backups and multiple devices
If you want support for multiple devices, I suggest Twilio Authy. Although it isn’t as big or widely known as Google or Microsoft, Twilio’s Authy app is one of the most impressive and feature-rich Google Authenticator alternatives. Twilio takes pride in the fact that its app can be used anywhere Google Authenticator can be used, meaning that those making the switch won’t hit any unexpected compatibility issues.
SEE: Authy vs Google Authenticator (TechRepublic)
It offers its own distinct advantages with some major quality-of-life features that make it easier to securely access your data. The app is available on multiple platforms, including iOS, Android, and Chrome, with the ability to synchronize your 2FA tokens across them so they’re always there when you need them. I appreciate how it enables users to view and edit their devices at any time and create securely encrypted backups in case any of them are ever lost or stolen.
Twilio provides regular updates for its Authy app, with the most recent improvement involving the delivery method of one-time passwords (OTPs). Beginning in February 2024, the company stated that OTPs would be sent via rich communication services (RCS), a more secure method than the default short messaging (SMS) channel, as it’s able to utilize Wi-Fi and cellular.
Why I chose Twilio Authy
Depending on the MFA solution, users could be locked out of their accounts if they lose their phone or other device. This is where I find Twilio really succeeds. It allows users to back up all 2FA tokens and restore them in the event that they lose their primary devices. Twilio also provides features to manage multiple devices, including the ability to sync and disable future installations for added security.
Pricing
- Twilio charges 5 cents per successful verification plus standard fees per channel for its basic version that includes 2FA, but custom pricing is offered for more advanced features.
Features
- 2FA.
- Multidevice sync.
- Soft token and backup.
- MFA.
- TOTP.
Twilio Authy pros and cons
Pros | Cons |
---|---|
2FA and MFA support for various authentication methods. | Advanced features and customization require the paid plan. |
Soft token feature eliminates the need for a physical hardware token. | |
Easy setup process and user-friendly interface. | |
Multidevice sync means users can access 2FA codes on different devices. |
Cisco Duo: Best for enterprises
For enterprises, my top recommendation is Cisco Duo. Some may find Cisco’s name a somewhat surprising inclusion on this list, as many associate them more with routers, internet phone systems, and other hardware. It is no slouch on the software side though, with Duo offering a very strong enterprise-level Google Authenticator alternative.
SEE: Best Authenticator Apps for 2024 (TechRepublic)
As part of its newest batch of updates, notable additions include a public preview for Verified Duo Push. This is a feature that provides a greater level of security by asking users for an additional verification code for push requests. Codes sent via SMS text message have also been streamlined, as codes are now machine-readable to allow mobile browsers to complete authentication without additional user intervention.
For me, one of Cisco’s biggest strengths as an MFA solution is that it’s part of a suite of software, which can also be used to set up and manage other useful information technology (IT) functionality, such as remote access and access control. This feature is targeted at commercial customers, however, and the pricing reflects that.
Although most alternatives to Google Authenticator are completely free but potentially relatively limited in terms of options, Duo can offer you a lot if you’re willing to pay for it. The free option, which Cisco advises is aimed toward individuals and very small teams, is most comparable to what Google offers and will be enough for many, although it faces competition from the likes of Authy. If you want desktop access or many of the more specialized features Duo offers, or you have more than 10 users, you’ll need to pay per user. Prices start at $3 per user, per month. That rises to $9 or potentially even higher depending on exactly which features you need.
Since Microsoft Authenticator is also an alternative we identified, you can learn more in our article comparing Cisco Duo vs Microsoft Authenticator.
Why I chose Cisco Duo
Implementing MFA for enterprises and large businesses can be complex. However, I’m confident in saying that Cisco is an excellent option to consider because of its Duo Policy Engine. This tool allows organizations to manage access across different users and levels of the company. Permissions and policies can also be customized based on user locations, remembered devices, device health, and more.
Pricing
- Free up to 10 users, Essentials is $3 per user, per month, Advantage is $6 per user, per month, and Premium is $9 per user, per month.
Features
- Risk-based authentication.
- SSO.
- Passwordless authentication.
- Complete device visibility.
Cisco Duo pros and cons
Pros | Cons |
---|---|
Comprehensive package for complete zero-trust access. | Expensive for organizations with a large number of users seeking to use advanced features. |
VPN-less remote access to private resources. | May require additional setup and configuration, which could be challenging for non-technical users. |
User-friendly and easy-to-use interface for both end users and administrators. | |
Complete device trust with an endpoint protection check. |
Yubico Security Key: Best for a physical security key
For businesses that require having a physical security key, I suggest going for Yubico Security Key. This Google Authenticator alternative offers something different. Rather than relying on an app installed on a phone or desktop, Yubico provides a physical key that serves as an authenticator. This key, which comes in USB-A and USB-C versions, will work out of the box with all of the major websites you’d expect it to, as well as common password managers and other software.
Usage is straightforward, the documentation is extensive and easy to understand, and the key itself feels very solid and durable. As well as the standard USB plug connectivity, tap-and-go authentication for mobile apps is included. I like how Yubico offers keys with even more features, such as the YubiKey Bio series, which integrates biometric security through the inclusion of a fingerprint sensor. This makes their product adaptable to different feature requirements, business needs, or use cases.
The YubiKey 5 series is the latest version of the product, which delivers additional options including the ability to opt for passwordless authentication, 2FA using a password with an authenticator, as well as MFA via passwordless verification and a PIN. It also offers a wide range of phishing-resistant authentication protocols, such as FIDO2/WebAuthn and Personal Identity Verification Smart Card.
Pricing varies depending on the size of your organization and whether you’re looking to buy the keys with an upfront payment or if you choose to subscribe. Subscribing can offer some savings to larger organizations, but individuals and smaller businesses who are confident they aren’t going to lose their keys may prefer to pay once and be done with it.
SEE: Multi-factor Authentication Deployment Guide (TechRepublic Premium)
Why I chose Yubico Security Key
I have Yubico on this list due to its convenient physical security keys that have authentication protocols, which are phishing-resistant. It also has a vulnerability present with SMS and some other methods of mobile MFA. Keys are easy to use and are supported by a wide range of online services and apps. Security keys can also be used to secure computers and even physical spaces.
Pricing
- Yubico security keys are available in different models and configurations, each with varying prices. The pricing depends on factors, including the model, connectivity ― USB-A, USB-C, NFC, and others ― and features of the security key.
Features
- 2FA.
- FIDO2 and U2F support.
- Multiprotocol support.
- Physical security.
Yubico Security Key pros and cons
Pros | Cons |
---|---|
Strong authentication with FIDO2 and U2F support. | Hardware security keys could be expensive for some. |
Compatible with various platforms and services, enhancing versatility and usability. | The need to have the physical security key for authentication may make them less convenient compared to mobile-based authentication methods. |
Provides a higher level of protection against account compromise. | |
Passwordless login, improving user experience and security. |
FreeOTP: Best for an open-source alternative
For transparency and privacy enthusiasts, I encourage you to check out FreeOTP. One complaint about Google Authenticator is that it’s no longer open source, with the relevant repositories not updated for several years. This isn’t an issue with FreeOTP, however, as it’s completely open source.
Version 2 is the latest major release of FreeOTP. It introduced a new material design user interface, default branding for major services, and the ability to backup and restore tokens. Three minor updates have since been provided, eliminating various bugs and providing slight enhancements.
Available on both Android and iOS, this authentication app is relatively lightweight and minimalist, both in terms of user experience and features.
Why I chose FreeOTP
As open-source software, FreeOTP can provide users with faster updates and resolutions to things like bugs and vulnerabilities. It also marked itself on my list for its high level of customization that is not possible with other private or proprietary software.
Pricing
Features
- 2FA.
- Open-source software
- TOTP.
- HOTP.
SEE: How to Create an Effective Cybersecurity Awareness Program (TechRepublic Premium)
FreeOTP pros and cons
Pros | Cons |
---|---|
Accessible and transparent open-source software. | Users must have their mobile device with them during login, which could be less convenient than hardware-based 2FA solutions. |
Strong 2FA support with TOTP and HOTP authentication methods. | The reliance on a mobile device could be a concern if the device is lost, damaged, or unavailable. |
Cross-platform availability for Android and iOS devices. | |
Works offline with no need for an internet connection during authentication, which enhances reliability. |
How do I choose among Google Authenticator alternatives?
You may want to consider alternatives to Google Authenticator if you desire the ability to customize your method of MFA, need to manage multiple devices or users, prefer using a physical security key, or want to work with a company that has different support options. Although companies that offer an MFA solution can accomplish the same goal of providing greater protection against unauthorized access to accounts, differences exist for the level of security provided and functionality that can affect ease of implementation, use, and maintenance.
In selecting a product that is suited to your needs, consider what you can afford as well as the features and characteristics most important to you. Think about differences in what’s offered for layers of authentication, backup and restore options, encryption protocols, customization, and support options, and tools to manage permissions for user groups.
For example, individuals or businesses particularly prone to phishing attacks may want the peace of mind that comes with a Yubico phishing-resistant security key. Similarly, companies with employees that need varying levels of permissions may want to look into Cisco’s Duo Policy Engine.
Regardless of the option you choose, adding MFA provides a layer of protection that can protect you from having to deal with the ramifications of allowing unauthorized access to your accounts.
For those interested in learning more, also check out our video feature on the Top Google Authenticator Alternatives below.
Methodology
When making this list, we considered a range of factors to ensure that we would be bringing you the very best Google Authenticator alternatives. Some of the key areas where these apps and services had to stack up are:
- Reputation: The software must come from a trustworthy, reputable company.
- Reliability: It’s also important that there is minimal downtime, to ensure that you’re always able to securely access your accounts and data when needed.
- Features: The apps in our selection offer a range of features, and each was selected, in part, for its ability to meet the needs of specific users in ways that Google Authenticator and other alternatives cannot.
- User experience: While offering a high level of security and unique features is important, so is the user experience, so we gave precedence to options that are easy for users to use.
- Value: Although some of our top picks are free, others aren’t. However, the paid options offer exceptional value provided you need and will take advantage of their additional features.