Sign In — Quick Steps
Enter your email and password, complete your chosen second factor if enabled, and confirm any device recognition prompts. Below is a mock form demonstrating the fields and typical flow for signing in.
Sign-in flow explained
Uphold's sign-in process typically involves these steps:
- Credential check: Your email and password are validated against hashed records stored securely.
- Device recognition: If you enabled device recognition, Uphold checks whether the current browser/device is known and prompts if it is new.
- Second factor: If 2FA is enabled, you are prompted to enter a time-based code, SMS code, or use a security key.
- Session creation: A secure session token is issued and stored in a cookie or secure local storage for authorized access.
Supported second factors
Typical options include:
- Authenticator apps (TOTP) — recommended for balance of security and convenience.
- SMS-based codes — convenient but less secure; avoid as sole protection for high-value accounts.
- Hardware security keys (U2F/WebAuthn) — strongest defense against phishing and account takeover.
Device recognition & trusted devices
Marking a device as trusted reduces friction: you can skip certain challenges on recognized devices. Periodically review and revoke trusted devices from your security settings to remove stale or lost devices.
Account Recovery & Identity Verification
Uphold supports account recovery flows in case you forget your password or lose 2FA methods. Recovery typically relies on a verified email, recovery codes, or identity verification. Be prepared to provide identification documents if necessary — forms of ID, selfie verification, and proof of address are common. Protect your recovery materials and avoid sharing them over insecure channels.
Recovery steps (overview)
- Use the "Forgot password" flow to receive a reset link to your registered email.
- If 2FA blocks access, use pre-generated backup codes or the account recovery process.
- For accounts with higher verification, expect additional KYC steps to restore access.
Recovery can be time-consuming for accounts with elevated verification — maintain current contact information and backup codes to reduce friction.
Business & Institutional Access
Uphold supports business accounts and institutional roles that include multi-user access, role-based permissions, and audit trails. Security recommendations for businesses include:
- Use multi-user roles with least-privilege access.
- Enforce hardware security keys for admin accounts.
- Implement multi-signature (multisig) or custody separation for large treasury operations where supported.
- Maintain clear onboarding/offboarding processes for employees and contractors.
For institutional customers, audit logs and permissioning help track activity and reduce insider risks. Regularly review account access and update permissions when roles change.
Privacy & Data Handling
Uphold collects personal information required to operate financial services and comply with regulations. This may include name, address, DOB, government ID, and transaction history. Review privacy settings in your account to manage marketing preferences. For sensitive operations like identity verification, use secure document storage and only submit documents through official channels.
Data minimization
Only provide the minimum required details during verification, and prefer official upload channels. Avoid sending sensitive documents via email to unverified addresses.
Troubleshooting — Common Login Problems
- Forgot password: Use the "Forgot password" link and follow instructions sent to your registered email. If you no longer control that email, begin account recovery with identity verification.
- 2FA codes not accepted: Check device time sync for authenticator apps or restore using backup codes. For SMS delays, ensure mobile provider connectivity.
- Unrecognized sign-in: If you see sign-ins from unfamiliar locations or devices, immediately change your password and revoke active sessions.
- Browser issues: Clear cache/cookies, try a private window, disable interfering extensions, or use a different browser.
- Account locked: Contact official support for locked accounts after verifying identity. Do not share passwords or full recovery codes with anyone claiming to be support via unsolicited channels.
Advanced Security Options
- Hardware-backed keys: Use FIDO2/WebAuthn security keys for phishing-resistant login.
- Dedicated devices: Use a dedicated machine for high-value operations and minimize installed software.
- Multisig & custody: For high-value holdings, consider multi-signature arrangements or institutional custody solutions supported by Uphold or partners.
- IP restrictions: For business accounts, apply IP allowlists where supported to restrict admin actions to specific networks.
Everyday Safety Checklist
- Use a unique password with a password manager.
- Enable 2FA and store backup codes securely.
- Use hardware keys for admin and high-risk accounts.
- Review active sessions and trusted devices monthly.
- Keep recovery and identity documents offline and secure.
When to Contact Support
Contact support if you suspect account compromise, cannot recover access, notice unauthorized transactions, or require help with identity verification. Prepare relevant information (without revealing secrets) such as recent transaction IDs, last successful sign-in time, and copies of verification documents when requested through official channels.
Never share your full password or recovery codes in support tickets or chats—support will never ask for them.