Your Guide to Account Management and Security

ยท

Navigating the essentials of account setup, security, and management is fundamental for any user. This guide provides clear instructions and answers to common questions, helping you maintain control and safety over your account. We cover everything from initial registration to advanced security protocols.

Finding Your User Identification (UID)

Your User ID (UID) is a unique identifier for your account. You can typically locate it within your account settings or profile information section after logging in. It is crucial for account verification and support inquiries.

Registering a New Account

Creating a new account is a straightforward process. You will generally need to provide a valid email address or mobile number and create a secure password. Follow the step-by-step instructions on the registration page to complete your setup.

Enhancing Security with Two-Factor Authentication (2FA)

Two-factor authentication adds a critical layer of security beyond your password. It requires a second verification step, drastically reducing the risk of unauthorized access.

Linking an Authenticator App

An authenticator app generates time-based verification codes. To link one, navigate to your security settings, select the option to enable 2FA, and follow the prompts to scan the provided QR code with your app.

Changing Your Authenticator App

If you need to switch to a new authenticator app, you must first disable the existing 2FA method in your security settings. You can then set up the new app by following the standard linking procedure.

๐Ÿ‘‰ Explore more security strategies

Using Physical Security Keys

For maximum security, consider using a physical security key. This hardware device connects via USB or NFC and provides robust protection against phishing. Register the key in your account's security settings for use during login.

Implementing Modern Access with Passkeys

Passkeys represent a shift towards passwordless authentication, using cryptographic keys stored on your device for a more secure and convenient login experience.

Creating a Passkey on Web

When prompted on a website, you can create a passkey using your device's built-up authentication method, such as Windows Hello or a fingerprint reader on your laptop.

Creating a Passkey on a Mobile App

The process within a mobile application is similar. Your device will guide you to create a passkey using its biometric sensors or PIN, which will then be associated with your account for future logins.

Managing Your Account Details

Keeping your account information current is vital for both security and functionality.

Updating Your Email Address

You can change the email address associated with your account from the personal details or security section of your settings. You will likely need to verify the new address through a confirmation link.

Changing Your Mobile Number

A similar process applies to updating your mobile number. Access your account settings, locate the phone number section, and follow the instructions to enter and verify your new number.

Understanding and Using Sub-Accounts

Sub-accounts are separate accounts managed under a primary master account. They are often used by institutions or individuals to segregate funds, manage different portfolios, or assign specific trading permissions.

Transferring Funds with Sub-Accounts

Transferring crypto between a main account and its sub-accounts is usually an internal process. Navigate to the transfer or funds section of your platform to initiate moves between your accounts.

Advanced Login and Device Management

Authorizing a New Device

The first time you log in from a new device, the platform may require explicit authorization. This often involves confirming the login attempt through a notification sent to your verified email or authenticator app.

Disabling Cloud Sync for Authenticators

For added security, you may choose to disable cloud synchronization features within your authenticator app. This ensures your 2FA codes remain solely on your physical device. Adjust this setting within the authenticator app itself, not your exchange account settings.

Account Administration

Downloading Your Account Statements

You can download comprehensive statements of your account activity for record-keeping or tax purposes. This option is typically found in a history, reports, or statements section within your account dashboard.

Temporarily Freezing Your Account

If you suspect unauthorized activity or simply wish to pause access, you can temporarily freeze your account through the security settings. This action will prevent any logins or transactions until you reactivate it.


Frequently Asked Questions

What is the most important security feature for my account?
Enabling two-factor authentication (2FA) is the single most effective step to secure your account. It acts as a critical barrier against unauthorized access, even if your password is compromised.

How do I choose between an authenticator app and a physical key?
An authenticator app is a convenient and free option for most users. A physical security key offers the highest level of protection against sophisticated phishing attacks and is recommended for those holding significant assets.

Can I recover my account if I lose my 2FA device?
Yes, account recovery is possible but requires going through a verified process. This usually involves confirming your identity via email and may require providing personal details to support staff to regain access.

What is the advantage of using a passkey?
Passkeys provide a more secure and user-friendly login experience by eliminating the need to remember passwords. They are resistant to phishing and are uniquely tied to your devices, enhancing overall security.

Why would I need to use a sub-account?
Sub-accounts are powerful tools for organizing finances. They allow for separate management of distinct strategies, enable delegated trading with specific permissions, and can enhance security by isolating funds.

Is freezing my account reversible?
Yes, freezing your account is a reversible, temporary security measure. You can typically unfreeze it by following a secure login and verification process to confirm your identity.