How to use Google 2-step verification with an older smartphone?

delia25

I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo. Apparently, you can only use 2-step verification with Android devices that are after 2.3 Gingerbread. I use the old phone as a WiFi only device and not as my main phone, but it will be pretty useless if I can't log on to Google accounts. Is there a way to use the old 2.2 phone with 2-step authentication?

Topic: Security
Answer this Question

Answers

2 total
wstark
Vote Up (18)

Yes, you can still use it, you just have to set it up a little differently. You will need to get an "application specific password" or ASP when you set-up your verified devices. Go to the "authorizing applications & sites" page under Google Account settings. The set-up page for 2-step authentication will offer the option of generating an ASP and once you select it and generate an ASP you can enter it into the window that will pop up on your phone. Enter it, and you are good to go. Once you go through this process, the older phone will work just fine with 2-step verification.  I also suggest installing Google Authenticator (free from Google Play)  on your mobile device once you have completed initial set-up. Hope this helps. Google also has a page that walks you through the process.

jimlynch
Vote Up (11)

Here's some info from the Google support page:

About 2-step verification
http://support.google.com/accounts/bin/answer.py?hl=en&answer=180744

Ask a question

Join Now or Sign In to ask a question.
New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services.
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a post by a forensics scientist, iOS author and ex-hacker.
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
Google, Microsoft and Yahoo are meeting with European data protection authorities Thursday to discuss how to implement a recent ruling that gives people the right to have personal information excluded from search results.
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
EBay faces a class action suit in a U.S. federal court over a security breach earlier this year.
A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.
Juniper Networks has divested its mobile security product line, selling the assets to a private equity firm for $250 million.
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness