Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Share on:

Recover Joomla If You Lost Google Authenticator Device

recover joomla
Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

Did you lose Google Authenticator Device or uninstalled?

I received few questions about how to recover Joomla Administrator if you accidentally uninstalled Google Authenticator or lost the device.

Don’t worry; a recovery procedure is not that complex.

Let’s see how to disable Two Factor Authentication in Joomla 3.2

Recovery Procedure

  • Go to Joomla installation directory
  • Go to the plugins folder
  • Rename twofactorauth folder

Now, try to access Joomla Administrator – you will no longer have a secret key field to enter.

This is one of the easiest ways to recover the Joomla Administrator when Google Authenticator is uninstalled or lost the device.

How to disable Google Two Factor Authentication

You can disable if you wish not to use two-factor authentication for whatever reason.

  • Login into Joomla administrator
  • Click on Extensions >> Plugin
  • Search for Two Factor Authentication – Google Authenticator and disable it

joomla-disable-two-factor

Easy, did it help you to recover your Joomla website?

If you are looking to add continuous monitoring and security protection to your Joomla site, then check out SUCURI.

Thanks to our Sponsors
More great readings on Joomla
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Semrush is an all-in-one digital marketing solution with more than 50 tools in SEO, social media, and content marketing.
    Try Semrush
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder