- Created by squatto
- 🗓 Last Updated: 23/05/23 10:12:30
- 🌟 Stars on GitHub: 111
- Please consider supporting the creator by Starring or Sponsoring them on GitHub!
- Get Workflow
- Get Latest Release
- Get Source Code
From their README
iMessage 2FA Workflow for Alfred
Find two-factor authentication codes in your recent iMessage messages.
Requirements
php
must be installed on your system- macOS Monterey does not have
php
preinstalled!
- macOS Monterey does not have
- We recommend using Homebrew to install
php
- To install Homebrew, follow the instructions on the "Install Homebrew" section of the Homebrew website
- Once you have installed Homebrew, install
php
by runningbrew install php
Installation
- Download the latest version of the workflow
- Install the workflow by double-clicking the
.alfredworkflow
file - You can add the workflow to a category, then click "Import" to finish importing. You'll now see the workflow listed in the left sidebar of your Workflows preferences pane.
Configuration
- By default, only messages received in the past 15 minutes will be searched
- You can change how many minutes to look back by changing the
look_back_minutes
workflow variable - Tutorial: How to set workflow variables
Usage
Type 2fm
to view the most recent two-factor authentication codes from iMessage messages.
Select a 2FA code and do one of the following:
- Press
to copy it to your clipboard - Press
⌘+
(command + enter) to copy it to your clipboard and paste it into the active app window using simulated keystrokes- Some websites (e.g. Wells Fargo online banking) don't support pasting a 2FA code, so this will instead simulate typing the code
- In order for this to work, you MUST grant Alfred automation access to
System Events
. If you haven't already done so, you will be prompted to grant access. See here for more information about Alfred automation.
- Press
⌥+
(option + enter) to copy it to your clipboard and paste it into the active app window using the system paste (similar to pressing⌘+V
)
Compatibility
This workflow was developed for use with Alfred 4.
Contributors
A huge thank you to our contributors!