Passkeys and two-factor authentication
Add passkeys, set up TOTP, store recovery codes.
Two ways to make your Dalea account substantially harder to compromise: passkeys (the recommended default) and two-factor authentication via TOTP (useful when you sign in with email-and-password).
Why bother
Lab accounts are valuable targets — they grant access to compounds, animal welfare data, and IP. The threat model isn't sophisticated nation-state actors, it's commodity phishing kits and password reuse. Both passkeys and TOTP defeat those.
Passkeys (recommended)
A passkey is a public/private key pair stored on your device's secure keychain. Signing in is biometric (Touch ID, Face ID, Windows Hello, your phone's fingerprint sensor) — there's no password to phish or to forget.
Modern OS keychains sync passkeys across your devices: a passkey added on a Mac shows up on your iPhone via iCloud Keychain; on Android via Google Password Manager; on Windows via Microsoft account.
Adding a passkey
- Settings → Security → Passkeys
Click Add a passkey.
- Authenticate with your platform
Touch ID / Face ID / Windows Hello / etc. Your OS prompts you.
- Name it (optional)
"Work MacBook" or "iPhone 15" makes the list readable later.
That's it. Next time you sign in, pick Sign in with a passkey and your device handles the rest.
Managing passkeys
Same settings page lists every passkey on your account: name, the device that registered it, last used, and a delete button. Delete passkeys for devices you no longer have. Renaming is fine — it doesn't invalidate the key.
TOTP (when you can't use passkeys)
If your team is on email-and-password, add TOTP as a second factor. TOTP = the 6-digit code that rotates every 30 seconds in apps like 1Password, Google Authenticator, Authy, or your password manager.
Setting up TOTP
- Settings → Security → Two-factor authentication
Click Enable TOTP.
- Scan the QR code
Use your authenticator app of choice. The app stores the secret and starts generating codes.
- Confirm with the current code
Enter the 6-digit code from your app to prove the setup worked.
- Save your recovery codes
Dalea shows ten one-time recovery codes. Save them in your password manager now. They're the only way back in if you lose your authenticator.
What changes after enabling TOTP
Every sign-in that uses your password now also asks for the rotating code. Sign-ins via OAuth (Google, GitHub, Microsoft) and passkey are unaffected — those already prove device possession.
Recovery codes
Recovery codes are single-use. Use one to sign in if you've lost your authenticator, then immediately disable and re-enable TOTP to get a fresh set. Treat them like the keys to the lab door — if someone has them they can sign in as you.
Mixing both
Passkey and TOTP is valid and secure but generally unnecessary; passkeys already prove device possession. The mainstream recommendation is:
- Use passkeys as your primary sign-in.
- Add TOTP as a second factor only on accounts that still rely on passwords (legacy setups, certain SSO migrations).
Recovery scenarios
- I lost my laptop
- Sign in from another device using your synced passkey, then delete the lost laptop's passkey from your account.
- I switched phones
- iCloud Keychain / Google PWM / Microsoft account migrate passkeys automatically. If you didn't use those, re-add a passkey on the new device.
- I lost my TOTP app
- Use a recovery code, then re-enrol TOTP fresh.
- I lost everything
- Contact your org admin. They can reset your account if SSO is enabled, or escalate to Dalea support.