11/22/2023 0 Comments Register vip access with fidelityOther authentication systems, like Microsoft Authenticator, allow the app to be configured on multiple devices, which may be a convenience for some users. The device owner also cannot change devices without assistance from Fidelity. Each device automatically has a unique Credential ID which cannot be changed, so that an account owner cannot have more than one device to provide the account one-time code. The Symantec app is designed so that it can only be installed on a single device. I wanted to share with you my observations and concerns about using the app to secure my Fidelity accounts.Ī. **update: given how *hit this app is, I’ll be turning off my 2FA for E*Trade so I NEVER EVER have to use this app again.I recently bought a new cell phone and needed to update my access to Fidelity with the Symantec VIP app. Kudos to Symantec for saving as much money as possible for a security application!!! ![]() As with most things, it seems Symantec spent the lowest amount they could and as with most other things, you get what you pay for. Maybe I shouldn’t expect billion-dollar companies to produce software that functions properly and is easy to use. The number of other poor ratings indicate that I’m not alone in my feelings about this app. Not being able to effectively link accounts, copy the OTP, or set up the app with a new phone is, well, absurd. ![]() I’m bringing that up because it’s simple RIDICULOUS that a company with significant enough resources to reach a 10+ billion dollar valuation (and one that supposedly focuses on digital security!) could produce an app that functions so poorly. One entry I found for Symantec’s valuation is 10.7 Billion. Enter this security code along with your password to add strong authentication to your favorite websites.īe sure to read the VIP End User Agreement after downloading VIP Access: Scan a QR Code at participating organizations such as Google, Facebook, Amazon, and more to generate a security code every 30 seconds to securely sign in. You can generate a security code even if you do not have a network or mobile connection. The strong authentication method you use depends on the method implemented by your participating organization. Note: Touch ID or Face ID authentication requires that your mobile device is Touch ID or Face ID capable and that you have registered a fingerprint or facial recognition authentication on the device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |