Duo Two-Factor Authentication: Frequently Asked Questions
|
|
|
- Sibyl Allison
- 10 years ago
- Views:
Transcription
1 Duo Two-Factor Authentication: Frequently Asked Questions The following links are for frequently asked questions related to the Duo two-factor authentication: General Questions Using Two-Factor with Your Phone Accessibility Enrollment Process Troubleshooting Shibboleth SSO Enabled Services which Require Duo Two-Factor Authentication General Questions What is the Duo two-factor authentication solution? Duo two-factor authentication is a cloud-based second-factor authentication with no software to install and no server to set up. Duo has patented technology and drop-in integrations to enable IT customers to easily integrate Duo into an existing application login workflow. See Duo Security for more information. The Duo model primarily relies on a smartphone to be the device in the user s possession. Most users will like the ease and convenience of using phones to verify their identity. Who will use the service? Any University of Miami faculty, staff, student, or designated affiliate who needs to have access to a system or service that is protected by Duo two-factor authentication will eventually need to use the service. At this time, however, the service is limited to pilot areas. When will I need to use the Duo two-factor authentication service? Once a user is enrolled in Duo, the user will need to answer a second-factor credential challenge to authenticate into any application or server that has been configured for the Duo Second-Factor Authentication service. Currently 2 nd -factor authentication is required for accessing any UMSSO (Shibboleth Single Sign-on) enabled applications. Why should a customer/user use the Duo Two-Factor Authentication service? With increasing security attacks across higher education institutions, passwords alone are not a sufficient way to protect resources. Duo two-factor authentication decreases the risk of compromise because a hacker would need to acquire the thing you have, as well as the thing you know. What are some of the features of the Duo two-factor authentication service? The services includes many features, such as flexible integration options for IT system administrators, user self-enrollment or bulk-enrollment options, one- tap authentication or a generated passcode when cellular service is not available, and no passwords or personally identifiable information (PII). (Examples of PII include social security numbers, credit card numbers, etc.) What data is stored by Duo two-factor authentication? The only data that Duo stores for a user is the subscriber s CaneID (Duo does NOT know your CaneID and password) and information about your second factor, such as a phone number (if using a phone for the service) or the serial number of your hardware token (if not using a phone 1/13
2 for the service). What if I lose my phone? Contact your service administrator immediately if your phone is lost or stolen. The administrator will disable it for authentication and assist you to register another device. Remember: Your CaneID and password (first-level authentication) will continue to protect your account even if your phone is lost. I am going to be traveling abroad. How can I continue to use Duo two-factor authentication? It s up to the user to know and understand the implications of using his/her cell service while abroad (cost to use the phone abroad, cellular service availability where traveling, etc.). If the user is satisfied with those conditions and is planning to use his/her device normally while traveling, then using the device as the second-factor will not change. Regardless of the implications of using a cell service abroad, if using a smartphone, then an enrolled user can simply use the Duo Mobile App to generate a passcode each time authentication is needed. Use the passcode as your second factor. Cellular service is not needed to generate passcodes through the Duo Mobile App. Using Two-Factor with Your Phone Do I need a smartphone to use Duo two-factor authentication? A smartphone is the best choice since it provides the greatest level of security and allows you to use the Duo Mobile app. The app generates passcodes for login and can receive push notifications for easy, one-tap authentication. Having said that, a smartphone is not required to use the service. I don t have a smartphone. Will I be able to Duo two-factor authentication on my regular cell phone? Yes, any cell phone will work, but it will not include the advantages of the Duo Mobile app (passcodes, prompts, etc.) and may result in regular cell phone charges in order to call back and authenticate (depending on the user s phone service). What if I wanted to use a landline at my office instead of my personal phone? You may use a landline instead of a mobile device; however, you need to take into consideration the stationary nature of a landline. Even if you work almost exclusively at your desk in your office (where the landline is located), you might on rare occasions need to have access to your UM protected services from home or from a remote location (such as an annual conference). What if I prefer to not use my phone at all? Can I still use Duo two-factor authentication? First, using Duo two-factor authentication on your phone is perfectly safe, and a smartphone is the preferable device to use for a number of reasons (app being available, calling prompts, one fewer thing to carry around and keep track of, etc.) In other words, a phone (especially a smartphone) is the preferred method. Can I use multiple phones, or am I restricted to one phone? You can set up Duo Two-Factor Authentication on multiple mobile devices (phones, tablets, etc.). Does it cost me anything to use the Duo two-factor authentication service via my phone? If so, will I be reimbursed by UM? Text messages and voice calls are sent only when you request them, and they would be billed by your carrier in the same way that any other text message or call would. UM will not reimburse you for these charges. If the charges when using Duo exceed a level that you re comfortable with, then consider switching to a landline rather than a cell phone for the service (understanding the limitations of a stationary phone). 2/13
3 Can I change to a different phone with a different number after I have the Duo two-factor authentication service? Yes, you can change to a different phone with a different number. You will need to reactivate Duo two-factor authentication on the new device, and if it s a different type of device (for example, if you re going from Android to iphone), then you will need to make sure that you select the new phone type before reactivating. What does the Duo Mobile app access on my phone? It does not access your other apps or other data on your phone; it uses some base functionality of the phone and a certificate that identifies your phone to ensure accurate identification. I m often in a location where I have poor cell coverage; how can I use the Duo two-factor authentication service? In cases where cell coverage is not available, use the Duo Mobile app to generate a passcode. Use the passcode as your second factor. If you re not using a smartphone (and therefore do not have access to the app), then generate passcodes in advance. I use a landline for my Duo two-factor authentication service, and I m going away for a week. Can I still use the Duo two-factor authentication service? Yes, you can forward your service to another phone. Do the SMS (text) passcodes provide by Duo expire? If so, how long are the passwords available for use? Passcodes are set to expire in 1 hour; however, there are a couple of things to keep in mind when using passcodes: Passcodes are only good for one use, so once a passcode has been used to authenticate into two-factor authentication, it is expired and cannot be used again. Our configuration has been set up to include 5 individual passcodes in each SMS (text) message. Any time a user requests a new set of passcodes, any unused passcodes from the previous SMS message are all expired. For example, if a user requests SMS passcodes, then an SMS message with 5 passcodes is sent. If the user realizes after using 3 of those passcodes that he/she is running low and asks for additional passcodes, those remaining two from the original message are no longer valid. They must use passcodes from the new list. Accessibility Are there any accessible options available? Some accessibility problems can be addressed by the phone itself; however, if someone has an accessibility problem that cannot be resolved by using the service with a phone, then there are accessibility options available. Please contact Identity Services for more information. Enrollment Process What are the enrollment options? There are three enrollment options: inline self-enrollment, self-enrollment invitations, and manual enrollment. 3/13
4 What is inline self-enrollment? This is when an individual who is going to use a smartphone for the service completes the enrollment process by using one of the applications that supports self-enrollment. Make sure to follow the process completely in order to successfully enroll. See the How to Enroll in Two-Factor Authentication page for information on self-enrolling. What is the self-enrollment invitation process? This is when an is sent to you in order to start the enrollment process. Follow the directions in the to complete enrollment. Make sure to follow the process completely in order to successfully enroll. What is manual enrollment? Manual enrollment is when a user shares enrollment information with a Two- Factor Authentication service administrator who completes the enrollment process and then notifies the subscriber by when the process has been completed. This is typically only done for a hardware token. What do I enter for a mobile phone that s not a smartphone when I m enrolling for the service? Whenever you re using a cell phone that s not a smartphone, select mobile as type and then unknown under platform. Troubleshooting I m trying to log into my Duo two-factor authentication service on my phone, but it tells me I can t. What should I do? Before attempting to troubleshoot any second-factor problem, make sure that the first-factor authentication (CaneID and password) is correct. If this is the first time that you ve used the service on this particular phone, then make sure that the enrollment process has been completed and then try again. If you ve used the service on this phone before and cannot login, then make sure that phone is not locked. If it is locked, then unlock the phone and start the mobile app (if on a smartphone) and try again. Make sure that you re using the correct mobile device. If you re using a new device (even if you have the same phone number), then reactivate the Duo Mobile app for the new device. (If you re changing types of phone, such as going from an Android to an iphone, then select the new type of phone before reactivating.) If the service is still not working, then contact the UMIT Service Desk. Why have I have stopped receiving push notifications on Duo Mobile? If you have stopped receiving push notifications, then check for network between your phone and Duo service. If there is not a network problem, then request a re-activation of the service from the UMIT Service Desk. I have a Windows tablet, but it does not seem to be compatible with Duo two-factor authentication. What should I do? Certain Windows platforms are not supported by Duo Mobile, so they will not work with two-factor authentication. Specifically, those with a full Windows operating system are not supported. Those with a mobile operating system, such as Windows Phone or Windows Mobile, are supported (and will work for two-factor authentication). 4/13
5 If the Windows platform on your device does not have an App store and is not supported, then there are a number of other device options available to enroll. Shibboleth SSO Enabled Services which Require Duo Two- Factor Authentication SERVICE PROVIDER AlcoholEdu ALEKS ALEKS with invalid class code BlackBaud Blackboard Web Box Cambridge Journals Online CampusLabs (Student Voice LLC ) Canelink CITI CMS (Cascade) Collaboration Wiki Spaces at Internet2 Collegenet CoursEval Courseware Stanford Daptiv DMP Tool (Univ of California - Office of the President) ECRT Prod EduCause Gartner GoAbroad Google Apps GradesFirst Handshake HathiTrust HBO 2 GO/CampusNow Hodes IQ Hyland (Shib) ILABS IMLeagues InCommon Federation Manager Internet2 Kaltura Kivuto Kronos Kuali 5/13
6 Laureate/SalesForce (in progress) Laureate Blackboard LeepFrog Library Subject Plus Lynda.com Maxient MSIT Federation Service (Microsoft) myum OBIEE OIM (caneid self-help) Orbis Org Sync Panopto Parking Proquest LLC Qualtrics REDCap REDCap UDavis SalesForce.com CRM Service Now Shibboleth Wiki Skillport SSERCA Sympa Tapingo Thomson Reuters IP and Science Tidemark Ulearn / Cornerstone UNIDays UnitedWay Uride Workday 6/13
What is Two-Factor Authentication?
What is Two-Factor Authentication? Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device)
Multi-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Securing your Juniper SSL VPN with two-factor authentication.
Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring
Setting Up and Accessing VPN
Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Can I transfer money to accounts I have at other Financial Institutions through Mobile Banking? No, we don t currently offer this service.
Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
Registration for My Profile & Administration
Registration for My Profile & Administration Table Of Contents User Registration... 1 Registering as a New User... 1 About the IDcipherTM Card... 7 How Do I Get An IDcipher TM Card?... 8 Two-Factor Authentication...
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.
Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Mobile Banking Questions and Answers
Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect
Facebook s Security Philosophy, and how Duo helps.
Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across
Faculty & Staff: Office 365 Email Migration
Faculty & Staff: Office 365 Email Migration Over the next few months, Berry College faculty and staff email accounts will be migrated to Office 365. This means that all of our emails are being moved to
Two-Factor Authentication
Two-Factor Authentication Two-Factor Authentication is an enhanced security feature for Payentry. It adds an extra layer of protection to ensure only authorized users can gain access to your data. In addition
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Two-Step Authentication FAQ
Two-Step Authentication FAQ General Questions Q: Why is Stanford requiring this additional step? A: Hackers, including foreign state-sponsored entities, are attacking university computer systems with ever-increasing
Configure AirWatch for Your Mobile Device
Configure AirWatch for Your Mobile Device These instructions created using an Android Smartphone AirWatch Mobile Device Management (MDM) Agent is an app that provides faculty and staff secure access to
Remote Access End User Reference Guide for F5 Edge VPN Client Access
Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:
Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle
Two-Factor Authentication Evaluation Guide
???? 22700 Two-Factor Authentication Evaluation Guide Learn what to look for when assessing and comparing two-factor authentication solutions. A helpful guide from Two-Factor Authentication Evaluation
These Frequently Asked Questions include information about both the Remote Identity Proofing (RIDP) and
Questions and Answers about Remote Identity Proofing and Multi- Factor Authentication About the Frequently Asked Questions These Frequently Asked Questions include information about both the Remote Identity
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Configure SLC Email to Smartphone/ Tablet
Configure SLC Email to Smartphone/ Tablet This is a manual that contains pertinent information about configuring your SLC Email to your smartphone/tablet. About Set up your email account on your smartphone/tablet
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Initial DUO 2 Factor Setup, Install, Login and Verification
Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way
Two Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
Online Services User Guide
Online Services User Guide Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. Log In: BankMidwest.com Online
How can I protect against the loss of my ID if my device is lost or stolen?
How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.
Information Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
Banking at the speed of your life. Online. Mobile. Superior. Safe.
Banking at the speed of your life. Online. Mobile. Superior. Safe. PARKSTERLING Answers You Can Bank On. At Park Sterling Bank, we know that there are times when our answer can help expand a child s future,
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2015 Akin Gump Strauss Hauer & Feld LLP Check Point
What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app?
What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app? How do I sign up to use mobile banking? What type of
McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions
Overview McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions What is EPCS? EPCS stands for Electronic Prescribing of Controlled Substances. Our
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Quick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
BroadTouch Business Communicator
BroadTouch Business Communicator Admin Guide Release 10.0.1 Document Version 1.0 Table of Contents 1 Summary of Changes...1 1.1 Changes for Release 10.0.1 Document Version 1... 1 2 About BroadTouch Business
Mobile Banking Frequently Asked Questions
Mobile Banking Frequently Asked Questions What types of Mobile Banking does Midwest BankCentre offer? We offer three types of Mobile Banking: Mobile Apps allows you to easily connect to Midwest BankCentre
ViewPoint Mobile Quick Start Guide
ViewPoint Mobile Quick Start Guide Step 1 Download the ViewPoint Mobile application. This MUST be done on the ios device, NOT the computer you sync your ios device with. The application will automatically
How To Get A Certificate From Digicert On A Pc Or Mac Or Mac (For Pc Or Ipa) On A Mac Or Ipad (For Mac) On Pc Or Pc Or Pb (For Ipa Or Mac) For Free
DigiCert User Guide Version 3.7 Contents 1 User Management... 7 1.1 Roles and Account Access... 7 1.1.1 Administrator Role... 7 1.1.2 User Role... 7 1.1.3 CS Verified User... 7 1.1.4 EV Verified User...
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
User Guide. SafeNet MobilePASS for Windows Phone
SafeNet MobilePASS for Windows Phone User Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Product
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
How Do I Log Into Mobile Banking?
1 How Do I Log Into Mobile Banking? In order to use any of Connex Mobile Banking service, you must register for Online Banking via a computer and browser. This is necessary to set-up all security settings
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Proposal Document TitleDocument Version 1.0 TitleDocument
G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public
Welcome to XO WorkTime
Quick Start Guide End User s Quick Start Guide (for Smartphones) Welcome to XO WorkTime for IP Flex, IP Flex with VPN, Enterprise SIP, and SIP Services Go mobile with your office telephone numbers and
MOBILE BANKING. Why should I use Mobile Banking?
MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data
Getting Started with the Skillsoft Learning App
Getting Started with the Skillsoft Learning App This guide will help you learn about important features and functionality in the Skillsoft Learning App. Install the Learning App You can install the Skillsoft
AirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES
APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were
Country Club Bank- Mobile Banking FAQs
Country Club Bank- Mobile Banking FAQs GENERAL... 2 MOBILE BANKING- WHAT IS IT?... 2 TEXT BANKING... 3 PHONE ENROLLMENT... 4 MOBILE BILLPAY... 5 TROUBLESHOOTING... 6 General How much does this service
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
MelbourneOnline Hosted Exchange Setup
MelbourneOnline Hosted Exchange Setup Your email on our Hosted Exchange servers can be accessed by multiple devices including PC, Mac, iphone, IPad, Android, Windows Phone and of course webmail. It s all
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
Setup your university email on your Android smartphone
Setup your university email on your Android smartphone This guide is designed for student users with an Office365 mailbox who wish to access their University email through an Android device Students starting
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Vehicle Monitoring Quick Reference Guide
Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Students Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
The Mobile app. Introduction. Phones that support the Mobile app. In this section
The Mobile app In this section Introduction Phones that support the Mobile app Download the mobile app onto your Android phone Download the mobile app onto your iphone Using the Mobile app Introduction
Workplace-as-a-Service BYOD Management
For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service
Business Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
How to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
Old National offers both Mobile Web and a Mobile App, so you can choose the best fit for your device type. Either solution enables you to:
Your bank. For your mobile life. Getting started You live life on the move, and Old National Mobile Banking goes right along with you. Whether you re at work, play, running errands or on vacation, you
AkrutoSync 4.0 User Guide
AKRUTO AkrutoSync 4.0 User Guide Welcome Thank you for choosing AkrutoSync. AkrutoSync can synchronize your Contacts, Calendar and Tasks between Outlook on your computer and your Windows Phone. AkrutoSync
AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform
AUT OneDrive for Business Instructions for Using OneDrive on Windows Platform Contents 1 What s OneDrive for Business?... 3 2 Storing Files... 5 1.1 Saving and Opening files from your Office applications...
B&SC Office 365 Email
B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.
Securing SharePoint Server with Windows Azure Multi- Factor Authentication
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 1, 2015 ISSN 2067 4074 Securing SharePoint Server with Windows Azure Multi- Factor Authentication Petru-Radu NARITA Department of Economic
MCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
USER-FAQ (2FA) Q. What are the key features of Fraud Management Solution (Baroda isecure)?
USER-FAQ (2FA) Q. What is Fraud Management Solution (Baroda isecure)? Ans. Fraud Management Solution (Baroda isecure) is an enhanced security solution which helps reduce chances of phishing attack on customer
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems
Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems Users of the OVPRI RAMS systems who wish to work off campus must utilize the Virtual Private Network (VPN) made available by VCU Technology
SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.
SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL 2016 Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.indd 1 5/11/15 3:31 PM TM Foreword... 2 Welcome to SUBARU
Single Sign-on Frequently Asked Questions
Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions
CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES
CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES Nicholas Roy Penn State (Pennsylvania State University, The) Andrea Harrington Penn State (Pennsylvania State University, The) Michael
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Cisco AnyConnect VPN for: Windows 8
Cisco AnyConnect VPN for: Windows 8 Introduction The following instructions detail how to set up Cisco VPN for Microsoft Windows using NetID+. You will need to use VPN with NetID+ if you are trying to
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
