Thomson Reuters Authenticator mobile app installation and permissions
The Thomson Reuters Authenticator mobile app is used to confirm your account via multi-factor authentication (MFA). When you enable MFA for your account, you will need to download the app to your mobile device and approve the requested permissions.
Video: Installing Thomson Reuters Authenticator on Apple iOS devices (approx. 2 minutes)
Video: Installing Thomson Reuters Authenticator on Android devices (approx. 2 minutes)
Download and install the app to your mobile device
The steps to download and install the Thomson Reuters Authenticator vary depending on your device's operating system.
Permissions requested by the mobile app
The Authenticator app needs the following permissions to send login confirmation requests so you can verify your account when you have MFA enabled.
- Camera: This permission grants access to your device's camera, which the mobile app uses to scan the QR code during MFA setup. Once you've completed MFA setup, you can disable this permission.
- Network: This permission grants access to send and receive network traffic, so the mobile app can receive sign-in requests and send your approval, enabling you to log in to your software or website account.
- Notifications: This permission grants access to your mobile device's notifications, which enables the Authenticator app to display sign-in requests on your device.
- Prevent device from sleeping: On Android devices, this permission enables the mobile app to illuminate your device's screen and display push notifications, and does not prevent your device from entering a low-power standby mode.
The Thomson Reuters Privacy Statement encompasses all the products and services we offer. As such, some portions of the privacy statement are applicable only to specific products and services. If a product or service collects or processes Sensitive Personal Information, we handle such data in accordance with applicable laws. Thomson Reuters would not handle Sensitive Personal Information unless the client entered the personal information into our software or systems themselves, or with proper consent obtained where necessary to handle.
Contact us
Was this article helpful?
Thank you for the feedback!