Why does storing 2FA codes in your password manager make sense?

Perceived Benefits of Storing 2FA in Password Managers

  • Main pro: easier setup, backup, and recovery; reduces risk of losing access when a phone is lost or upgraded.
  • Encourages wider 2FA adoption; many users will skip 2FA if it can’t be kept with passwords.
  • Autofill tied to domains can block many phishing attempts because credentials and TOTP won’t appear on mismatched sites.
  • For some, storing TOTP with passwords is seen as “good enough” and better than SMS or email 2FA.

Security Concerns and Arguments Against

  • Combining passwords and TOTP in one vault collapses two factors into one compromise point.
  • If a password manager is breached or a shared vault misused, attacker may get both password and 2FA secrets, turning 2FA into near-1FA.
  • Some see TOTP-in-password-manager as feature creep driven by convenience and marketing, not security.
  • Storing TOTP separately (another device/app, paper, second vault) forces an attacker to break two independent systems.

Phishing, Credential Stuffing, and 2FA’s Real Role

  • Disagreement on claims that TOTP’s “main advantage” is phishing resistance: TOTP and SMS codes are still phishable, especially with real‑time proxy attacks.
  • Several argue 2FA’s key value is preventing credential stuffing when users reuse passwords.
  • Time‑limited codes constrain a stolen credential to a short window, but automation can still exploit that.

Passkeys, Hardware Keys, and Factor Models

  • Passkeys/hardware keys highlighted as phishing‑resistant and better than TOTP in that respect.
  • Some note inconsistency: critics dislike co‑locating TOTP with passwords but accept passkeys tied to the same device/ecosystem.
  • Debate over the classical “something you know / have / are” model; some view almost everything as ultimately “something you know” (bits), others still find the model useful.

Usability vs. Purism

  • “Purist” stance: keep TOTP off the password manager for stronger separation.
  • Pragmatic stance: if separate 2FA causes lockouts or discourages 2FA, then storing TOTP in a good manager is a net win.
  • Especially for non‑technical users, passwords + TOTP in one manager may be significantly safer than weak or reused passwords without 2FA.

Alternative Setups and Backups

  • Common patterns:
    • Passwords in one manager, TOTP in a separate app (e.g., Aegis, Authy, FreeOTP+, Google Authenticator with sync/export).
    • File‑based managers (KeePass variants) with strong master passwords, keyfiles, or hardware keys; manual sync and offline backups.
    • Redundant devices for TOTP, printed or CSV‑based encrypted backups, or minimal “emergency” TOTP vaults on paper.
  • Some prefer hardware‑key 2FA (e.g., FIDO/WebAuthn, multiple keys) for critical accounts; TOTP‑in‑manager only for low‑value or forced‑2FA sites.