Kraken's MFA implementation goes beyond the industry standard of a single TOTP code at login. The platform supports granular 2FA assignment across four distinct action categories: Sign-In, Trading, Funding, and API Key Management. Each category can use a different authentication method, creating a layered defense where compromising one factor does not grant access to all operations.
Hardware security keys (FIDO2/WebAuthn) represent the gold standard. These devices — YubiKey 5 series, Google Titan, SoloKeys — perform cryptographic challenge-response authentication bound to the specific domain. A phishing site running on a lookalike domain cannot extract a valid signature because the key verifies the origin before signing. This property makes hardware keys immune to the most common attack vector in cryptocurrency theft: credential phishing.
TOTP applications (Google Authenticator, Authy, Aegis) provide strong protection for users who do not own hardware keys. Kraken generates a unique secret during enrollment and never stores it in recoverable plaintext after initial setup. Time synchronization between server and client ensures codes expire every 30 seconds. Rate limiting on verification attempts prevents brute-force guessing of 6-digit codes.
The Master Key sits beneath these layers as a recovery failsafe. It is a static password or secondary hardware key stored offline. When your primary 2FA device is lost or destroyed, the Master Key can reset authentication without waiting for GSL expiry. Kraken strongly recommends generating this during account setup and storing it in a fireproof safe or safety deposit box — never in a password manager alongside primary credentials.