Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»Secure your Twitter account with a FIDO security key
    Android

    Secure your Twitter account with a FIDO security key

    Peter KlapwijkBy Peter KlapwijkJuly 31, 2021Updated:October 29, 20235 Mins Read

    A lot of people are already familiar with FIDO2 compatible security keys to sign in without a password to services like Office 365/ Azure AD. But passwordless sign-in is not the only use case for these keys. The keys can also be used as a second authentication factor for more and more online services as they support the FIDO Universal 2nd Factor (U2F) protocol. Among these online services are big social media platforms like Facebook and Twitter.

    Twitter is one (the only?) of the first social media platforms which have the option to use security keys as the only form of two-factor authentication (2FA), as they announced in this blog post. They allow you to turn off other 2FA options like text messages (SMS) and authenticator apps. This only allows you to sign in to Twitter with your password and security key, which takes security to a higher level.

    And also not entirely unimportant, Twitter also supports mobile devices running Android and iOS, unlike other platforms like Facebook at the moment of writing this blog. Which is a requirement for most people, as social media is mostly used on mobile devices.

    So if you are already equipped with a FIDO2 security key, why not start using the key to also secure your Twitter account?

    I’m equipped with several security keys, some support NFC for communication with mobile devices. I also have a Feitian iePass K44, which has a USB C and lightning connector. An ideal key for usage with mobile devices.

    For this article, I used the iePass key from Feitian. But as long as you’re able to connect your key to your device (NFC, USB/lightning, or bluetooth), you should be good to go.

    Let’s see how we can use the key with Twitter on several operating systems.

    Security key usage on Windows

    An easy way to manage your security key with Twitter is using a device running Windows 10. Window 10 itself has built-in management capabilities as I described in this previous article. You can add a PIN to the key or reset the key directly from the Windows Settings, unlike other platforms like macOS which require a third-party app.

    Make sure your key is set up with a PIN.

    To add a security key to your Twitter account, sign in to your account with a browser like Edge.

    • Open Security and Privacy
    • Choose Security and account access
    • Choose Security
    • Choose Two-factor authentication
    • Check Security key
    • Choose Add new security key
    • Click Start
    • Insert your security key
    • Click OK
    • Enter your PIN
    • Touch the key
    • Provide a name for your key

    The key is added to your account.

    From the Manage security keys section, you’re able to rename or delete the keys.

    Next time when you sign in to Twitter, you’re asked for your security key.

    Security key usage on iOS

    We don’t need a Windows device to set up our security key, like the Feitian iePass. Feitian provides an app in the App Store and Play store, iePassManager, which we can use to set a PIN on the key when it’s a new key. And also other key vendors provide such apps.
    So these keys can be used by users who only have devices running iOS or Android.

    When we open the app and insert the key, it’s recognized by the iePassManager. As this is a new key, I can set a PIN, which is a straightforward process.
    Tap SetPIN.

    Enter a new PIN twice and click OK.

    And the PIN is set successfully.

    The PIN is set up and ready to be used with the Twitter app.

    To set up the security with Twitter, the Twitter app opens a browser. Where Safari is the default browser on iOS, using that browser as default didn’t work fine for me. It first showed me a pop-up to recognize the key, but soon after that, a message was shown this setup wasn’t support with this browser. I set Edge as the default browser, rebooted the iPhone and everything worked fine. I’m not sure if Safari indeed doesn’t support the key, but it’s at least worth mentioning here.

    To add the security key to our account, open the Twitter app and make sure you’re signed in.

    Tap Settings and privacy

    Tap Account.

    Tap Security.

    Tap Two-factor authentication.

    Tap Add a new security key.

    Tap Open Safari.

    Again, tap Add a new security key.

    Your subtitle here

    Enter your Twitter password.

    Tap Start, to start the enrollment of the security key.

    Insert the key and tap it, to allow Twitter to use the key.

    Enter the PIN of the security key and tap continue.

    Enter a name for the key.

    And the key is added to our Twitter account!

    Now that we added the security key to our account, next time we’re asked for a second factor for authentication, we’re asked for our security key.

    Security key usage on Android

    The usage of the keys isn’t much different on Android compared to iOS.
    Below is a short video of how we add the key to Twitter using an Android device.

    And below is a video of how we can use a security key to sign in to Twitter.

    If you do enable security keys as the only form for MFA, by disabling the other options like SMS, it’s advisable to register two keys in case you lose one.

    Let’s keep our (social media) accounts secure.

    Thanks for reading!

    Android FIDO U2F FIDO2 iOS MFA Multi-Factor Authentication Passwordless Security Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Secure personal mobile devices with Microsoft Intune and Defender for Endpoint

    August 11, 2021

    My first experience with Temporary Access Pass during Windows Autopilot enrollment

    February 26, 2021

    Deploy and manage Microsoft Edge Chromium with Intune

    January 17, 2020
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}