You can set up your GitHub Enterprise account to require an authentication code in addition to your password when you sign in.
Two-factor authentication, or 2FA, is a way of logging into websites that requires more than just a password. Using a password to log into a website is susceptible to security threats, because it represents a single piece of information a malicious person needs to acquire. The added security that 2FA provides is requiring additional information to sign in.
A Time-based One-Time Password (TOTP) application automatically generates an authentication code that changes after a certain period of time.
After successfully setting up two-factor authentication via a TOTP mobile application , the Two-factor recovery codes (
https://[hostname]/settings/auth/recovery-codes) page lists your valid recovery codes. We strongly recommend saving your recovery codes in a safe place, like a password manager. If you're unable to save them immediately, you can download them at any point after enabling two-factor authentication.
With 2FA enabled, you'll be asked to provide your 2FA authentication code, as well as your password, when you access GitHub Enterprise.
On your Android phone, you can use a FIDO U2F compatible security key and Google Authenticator to securely sign into your GitHub account with Near Field Communication (NFC).
Having access to your recovery codes in a secure place will get you back into your account.
If you disable two-factor authentication for your personal account, you may lose access to organizations you belong to.