Manage a user's security settings (2024)

As an administrator for your organization'sGoogle Workspace or Cloud Identity service, you can view and managesecurity settings for a user. For example, you can reset a user's password, add or remove security keys for multi-factor authentication, and reset usersign-in cookies.

Open usersecurity settings

  1. Sign in to your GoogleAdminconsole.

    Sign in using your administrator account (does not end in @gmail.com).

  2. In the Admin console, go to MenuManage a user's security settings (1)Manage a user's security settings (2)Manage a user's security settings (3)DirectoryManage a user's security settings (4)Users.
  3. In the Users list, find the user.

    Tip: To find a user, you can also type the user's name or email address in the search box at the top of your Admin console. If you need help, go to find a user account.

  4. Clickthe user’s name to open their account page.
  5. At the top, click Security.


    Manage a user's security settings (5)

  6. View or manage the user's security settingsby following the steps below.

View and manage user security settings

Expandall|Collapseall

Reset a user's password

  1. Click Password Manage a user's security settings (6)Reset Password.
  2. Choose to automatically generate the passwordor enter a password.

    By default, password minimum length is 8 characters. You can change password requirements for your organization.

  3. (Optional) To view the password, click Preview Manage a user's security settings (7).
  4. (Optional) To require the user to change the password, ensure thatAsk for a password change at the next sign-inis OnManage a user's security settings (8).
  5. Click Reset.
  6. (Optional) To paste the password somewhere, such as in a Google Chat conversation with the user,click Click to copy password.
  7. Choose to email the password to the user, or click Done.

View, add, or remove security keys

A security key is a small device that lets you signin to a Google Account using 2-Step Verification (2SV). Of all the 2SV methods supported by Google, a security key is the most secure. Itplugs into your computer's USB port or connects to your mobile device using NFC or Bluetooth.Learn more

If a security keyis in use for this user, click the Security keys section to learn when the key was added and last used.

Add a key

You can add a security key for a user, or they can add their own keys.

  • To let users add their own key:
    1. Make sure that the skip password setting is off for users. For the steps, go to Turn skip passwords on or off for users.
    2. Tell users to follow the instructions in Use a security key for 2-Step Verification.
  • To add a key for the user:
    1. Click in Security keysManage a user's security settings (9)Add Security Key.
    2. Follow the on-screen instructions.

      Note: If you have a security key plugged in to your computer, remove your key before registering a new key for a user.

    3. Click Done.

Remove a key

Remove a security key only when the key is lost. If a key is temporarily unavailable, you can generate backup security codes as a temporary workaround. GotoGet backup verification codes for a user.

  1. Click in Security keys to display the key information table.
  2. Scroll the table all the way to the right.
  3. Hover over the table line for the key you want to remove and clickDelete Manage a user's security settings (10)at right.
  4. Click DeleteManage a user's security settings (11)Manage a user's security settings (12)Remove.
  5. Click Done.

    Admin log events adds an entry each time you revoke a security key.

Note: You can require users to use security keys with 2-Step Verification.

Check Advanced Protection enrollment

As an admin, you can check a user’s Advanced Protection enrollment status and if necessary, you can unenroll them at the user level.

  • The On status means that the user is currently enrolled in Advanced Protection.
  • The Off status means that the user is not enrolled in Advanced Protection.

If you turn off Advanced Protection enrollment here, only the user can re-enroll again provided that the Enable user enrollment setting is enabled at SecurityManage a user's security settings (13)AuthenticationManage a user's security settings (14)Advanced Protection Program. For details, go to Enable users to enroll.

Check 2-Step Verification settings

Only the user can turn on2-Step Verification(2SV).As admin, you can check a user’s current 2-Step Verification setting and if necessary get a backup code for a locked-out user.

The 2-Step Verification section shows whether 2SV is turned on for the user, and whether 2SV is currently enforced across your organization.

  • You have the option of turning off 2SV for a locked-out user, but this isn’t recommended. Instead, get a backup code for the user to allow them to sign in to their account.

    Note:You can't turn off 2SV for a user if their account is suspended.

  • If 2SV is enforced across your organization, the option to turn off 2SV for an individual user is disabled.

Get backup verification codes for a user

Users who temporarily can’t access their second authentication method may get locked out. For example, a user may have left their security key at homeor can’t receive an access code by phone. For these users, you can generate backup verification codes to allow them to sign in.

  1. To view the user's backup verification codes, click2-Step VerificationManage a user's security settings (15)Get backup verification codes.
    Note: Creating new verification codes invalidates any existing code. For example, if you created a user's verification code using the Admin Console and then generate a new verification code using the verification codes, the previous set of codes is invalidated and vice versa.
  2. Copy one of the existing backup codes or generate new codes. Note: Select Generate new codes If you think the existing backup codes were stolen or have been used up. The old set of backup codes automatically become inactive.
  3. Tell your user to follow the instructions inSign in using backup codes.

If the user is required to use 2-Step Verification with a security key:

  • The user can't generate their own backup verification codes. An administratorneeds to generate these codes and provide them to the user when needed.
  • Once you generate codes for the user, the user's grace period for using these codes begins. You'll be informed of the grace period that's left before they need to use their security key to sign in.

For details on setting up 2-Step Verification requirements for users, go to Deploy 2-Step Verification.

Force a password change

If you suspect that theuser's password has been stolen, you can force the user to reset their password when they next sign in.

  1. Click Require password changeManage a user's security settings (16)Turn onManage a user's security settings (17).
  2. Click Done.

After the user resets their password, this setting is automatically set to Off.

Note: If your organization uses SSO through a third-party IdP, the force a password change setting isn't availableunless you use a network mask to allow some users to sign in directly to Workplace. To check whether a network mask is set up, go to SecurityManage a user's security settings (18)SSO with third-party IDPsManage a user's security settings (19)SSO profile for your organization.

Edit a user’s recovery information

If Google suspects an unauthorized attempt to sign in to a user's account, a login challenge appears before access to the account is granted. The user must either:

  • Enter a verification code that Google sends to their recovery phone number or recovery email address (an email address outside your organization).
  • Answer a challenge that only the account owner can solve.

To add or edit a user’s recovery information:

  1. Click Recovery information.
  2. Add or edit either of the following:
    • Email address (outside of your organization)
    • Recovery phone number

      Note: The recovery phonenumber should be unique for each user. If the same recovery phone number is used by multiple users, that number is automatically blocked for security reasons.

  3. Click Save.

Temporarily turn off a login or verify-it's-you challenge

If Google suspects an unauthorized attempt to sign in to a user's account, a login challengeappears before access to the account is granted. The user must enter a verification code that Google sendsto their phone. Or,the user can choose to answeranother challenge that only the account owner can solve.

Also, if a Google Workspace user attempts a sensitive action, that user is sometimes presented with a verify-it's-you challenge. If the user can't enter the requested information, Google will disallow the sensitive action.

If the authorized user can't verify their identity, you can turn off the login or verify-it's-you challenge for 10 minutes to allow the user to sign in.

Reset the user's sign-in cookies

If a user loses theircomputer or mobile device, you can help prevent unauthorized access to their Google Account by resettingtheir sign-in cookies. This signs the user out of their Google Account (including any Google Workspace applications) across all devices and browsers.

Note: If you suspended a user, you don't need to do this. Suspending a user resets their sign-in cookies.

If youset up single sign-on (SSO) using a third-party identity provider (IdP), the user's SSO session may still allow access to their Google Account after resetting their sign-in cookies. In this case, terminate theirSSO session before resetting their Google sign-in cookies. For help with SSO management, contact your IdP support team.

To reset theuser's cookies:

  1. Click Sign-in cookiesManage a user's security settings (20)Reset.
  2. Click Done.

It can take up to an hour to sign the user out of current Gmail sessions. The time for other applications can vary.

View and revoke application-specific passwords

If your users use 2-Step Verification and need to sign in to apps or devices that don’t accept verification codes, they need application-specific passwords to access those apps. Learnmore about signing in withapp passwords.

Any apps for which the user has created app passwords are listed in the Application-specific password section. Note: If no app passwords are in use, this section is inactive.

Click an app name for more information on when the password for that app was created and when it was last used.

You should revoke an app password if a user loses a device or stops using an app that was authorized with that password.

  1. Click in the Application-specific password section to view apps using app passwords.
  2. Mouse over an app name and click RevokeManage a user's security settings (21)at right.
  3. Click Revoke.
  4. Click Done.

Your users can also revoke their own app passwords.

View and remove access to third-party applications

The Connected applications section lists all the third-party applications (for example, Google Workspace Marketplace apps) that have access to this user’s Google Account data. Learn how authorized access works.

Note: If no third-party applications have been installed, this section is inactive.

Click an application name for more information:

  • The Access level column shows the user data that the application can access. A user can grant full or partial access to Google data.
  • The Authorization date column shows when the application was granted data access.

To temporarily remove an app’s access to data:

  1. Mouse over an app name and click RemoveManage a user's security settings (22)at right.
  2. Click Remove.
  3. Click Done.

Note: Removing data access for an app doesn't prevent a user from using the app in the future (if the user has the necessary permissions). Once a user signs into the app again, data access is restored. To permanently restrict user access to applications, you can block access to specific application scopesand set up an allowlist of approved apps for your organization.


Google, Google Workspace, and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companieswith which they are associated.

Was this helpful?

How can we improve it?

Need more help?

Try these next steps:

Post to the help community Get answers from community members Contact us Tell us more and we’ll help you get there

Start your free 14-day trial today

Professional email, online storage, shared calendars, video meetings and more. Start your free Google Workspace trial today.

Manage a user's security settings (2024)
Top Articles
What Were the Original Dow Jones Industrial Average (DJIA) Companies?
Yes, It’s Scary to Invest When Markets Are High | How to Proceed
Thor Majestic 23A Floor Plan
Mackenzie Rosman Leaked
Think Of As Similar Crossword
PGA of America leaving Palm Beach Gardens for Frisco, Texas
Moe Gangat Age
Mawal Gameroom Download
Dallas’ 10 Best Dressed Women Turn Out for Crystal Charity Ball Event at Neiman Marcus
Dr. med. Uta Krieg-Oehme - Lesen Sie Erfahrungsberichte und vereinbaren Sie einen Termin
Andhrajyothy Sunday Magazine
Royal Cuts Kentlands
Missed Connections Inland Empire
FDA Approves Arcutis’ ZORYVE® (roflumilast) Topical Foam, 0.3% for the Treatment of Seborrheic Dermatitis in Individuals Aged 9 Years and Older - Arcutis Biotherapeutics
Mtr-18W120S150-Ul
Litter Robot 3 RED SOLID LIGHT
Walgreens Bunce Rd
Wiseloan Login
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
CVS Health’s MinuteClinic Introduces New Virtual Care Offering
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
Delta Math Login With Google
Progressbook Newark
Devargasfuneral
Vistatech Quadcopter Drone With Camera Reviews
Sun-Tattler from Hollywood, Florida
Bee And Willow Bar Cart
Bridger Park Community Garden
Craigs List Jonesboro Ar
Oriellys Tooele
Housing Intranet Unt
Puretalkusa.com/Amac
Husker Football
All Obituaries | Sneath Strilchuk Funeral Services | Funeral Home Roblin Dauphin Ste Rose McCreary MB
Chathuram Movie Download
Academic Notice and Subject to Dismissal
Flappy Bird Cool Math Games
Blow Dry Bar Boynton Beach
Elven Steel Ore Sun Haven
St Anthony Hospital Crown Point Visiting Hours
Hdmovie2 Sbs
Take Me To The Closest Ups
552 Bus Schedule To Atlantic City
Theatervoorstellingen in Nieuwegein, het complete aanbod.
The Plug Las Vegas Dispensary
60 Second Burger Run Unblocked
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
Gelato 47 Allbud
How To Find Reliable Health Information Online
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6031

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.