Virtual Code Authentication User s Guide. June 25, 2015

Similar documents
Virtual Code Authentication User Guide for Administrators

Business Banking Customer Login Experience for Enhanced Login Security

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below.

Optum ID Migration for Provider Express Users

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

account multiple solutions

Hallpass Instructions for Connecting to Mac with a Mac

Electronic Questionnaires for Investigations Processing (e-qip)

Cash Management 5.0 User Guide

Monash Health Self Service

Broker Portal Tutorial Broker Portal Basics

Instructions For Opening UHA Encrypted

SECURE COMMUNICATIONS PLAN Updated August 25, 2011

NetSupport DNA Configuration of Microsoft SQL Server Express

Online Employment Application Guide

Portal User Guide. Customers. Version 1.1. May of 5

Logging into LTC Instant Access the First Time

Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin

River Valley Credit Union Online Banking

i-mobile Multi-Factor Authentication

Parental Control Setup Guide

NU SSO Account Activation Job Aid NU Employees

CLIENT ACCESS> emoney

Accessing the FTP Server - User Manual

How Do I Status My Vendor-Owned Resources in ROSS?

MULTI-FACTOR AUTHENTICATION SET-UP

Security Upgrade FAQs

Multi-Factor Authentication Job Aide

Accessing the Media General SSL VPN

Active Directory Validation - User Guide

DOMAIN CENTRAL HOSTING

Multi-Factor Authentication Reference Guide

The MyCSF Portal Guide

NeoMail Guide. Neotel (Pty) Ltd

Multi-Factor Authentication (MFA)

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

NetSupport DNA Configuration of Microsoft SQL Server Express

Enrollment Process for Android Devices

Marcum LLP MFT Guide

Managing policies. Chapter 7

Enhanced Security for Online Banking

Welcome (slide 1) Welcome to the Florida Department of Education Single Sign-On tutorial for federated user login and navigation.

Lytecube Technologies. EnCircle Automation. User Guide

Portal Recipient Guide

How to... Send and Receive Files with DropBox

Getting Started With Citrix ShareFile

Your Archiving Service

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Secure Global Desktop (SGD)

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

GET IN NOW Step 2: Add Users

Mediasite. captioning

Welcome to Business Internet Banking

Active Directory integration with CloudByte ElastiStor

Installation Guide. Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise.

Connecting to Remote Desktop Windows Users

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0

Stewart Secure User Guide. March 13, 2015

Updated: 7/10/2013 Author: Tim Unten

Configuring Sponsor Authentication

Personal and Small Business Login Guide

Table of Contents. Welcome Login Password Assistance Self Registration Secure Mail Compose Drafts...

User s Guide For Department of Facility Services

IIS, FTP Server and Windows

Guide for Completing EIDM Account setup for Migrated IACS Users who are currently inactive

Self-Service Password Manager

PNC PayCard Program Cardholder Website How-To Manual

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

User Roles & Adding Domains & Users

1. Cloud Data Center Login to ICT Marketplace Portal Dashboard Data center management New data center...

PaymentNet Federal Card Solutions Cardholder FAQs

Secure Retrieval (First Time)

Wireless Guest Server User Provisioning Instructions

Secure Actions for Recipients

MICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD

Cash Management. Getting Started Guide

Provider OnLine. Log-In Guide

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

XPRESSIONS WEB ASSISTANT QRG

Secure A Guide for Users

Online Valuation Portal User Guide

Document From MAXIMUM BUSINESS INFORMATION TECHNOLOGY ON A. OwnCloud User Manual. TO I Cafe`

State of Hawaii Department of Education. Self-Service Password Manager User Guide.

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Egnyte App for Android Quick Start Guide

M&T Web InfoPLU$ GETTING STARTED GUIDE

Installing the Citrix Online Plug-In

User guide. Business

U.S. Bank Secure Mail

Encryption Procedures

Using YSU Password Self-Service

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

ONLINE REGISTRATION FOR CDF APPLICANTS

User Management Guide

GRANTS AND CONTRIBUTIONS ONLINE SERVICES: USER GUIDE (REGISTRATION AND ACCOUNT MANAGEMENT)

Transcription:

Virtual Code Authentication User s Guide June 25, 2015

Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other online systems. Configurable password settings have been in place which allows for sub-standard password practices among users. As such, you will now go through a two-step log in process. 1. Enhanced Passwords Going forward, your password must contain a minimum of 8 characters and include at least one of the following: Uppercase Letter Lowercase Letter Number Symbol Example: Password1$ 2. Multi-Factor Authorization (MFA) or Virtual Code Authentication After you enter your username/password and click login, if the system does not recognize this computer as one you have used in the past 30 days, the system will require a second form of authentication before you can continue. A code will be emailed, texted, or sent to you via an automated voice call, which you will then enter, in order to access the system. The security combination factors are as follows: Password = something you know Code = something you have

Multi-Factor Authentication Multi-factor authentication requires a user who is requesting access to provide independent authentication factors; a Knowledge Factor, and a Possession Factor. Knowledge Factor: Something only the user knows (such as a password) Possession Factor: Something only the user has (a code) One option for the Possession Factor is by virtual code. This works by sending a code to you either by SMS (text message), Voice Call or E-mail. Once the code is received, you will sign in with your username, password and the supplied code. Once correctly entered, you will then be able to login to the system. The User s Experience The first time you login, you will be required to configure the Multi-Factor Authentication settings for future logins. Step 1: Enter Username and Password on the login page.

The Change Password screen will display where the password must be changed to one with the new requirements. The screen will explain the new password standards. Mobile users will also receive this screen.

Step 2: You will then be prompted to configure the Multi-Factor Authentication Settings. Up to three methods can be configured for receiving your code. SMS Mobile #: Will be used to send codes via text message (fastest method) Voice Phone #: Will be used to send codes via voice message Email: Will be used to send codes via email address One or more methods may be selected. Any information that is already listed in your account will be prepopulated. If multiple phone or email numbers are stored in the system, those will be made available to you via the drop-down lists shown in each field. You may also enter new information not stored in the system. When this happens, an administrator must approve the new credentials. Once this step is completed, you will be logged directly into the system. For any logins thereafter, the code will be delivered via the selected method and is unique to you and will expire in 15 minutes. Once you enter the code, you can choose to make the computer trusted by checking Remember This Device where an encrypted cookie will be placed on the machine for your browser. A trusted computer will not require the 2nd factor again unless the cookie expires or is deleted via the web browser options. It can expire you do not log in for 30 days but the 30 day counter is reset upon every successful login. Step 3: Anytime thereafter, when logging in from a device that has not been remembered, you will be asked which method you would like to use to receive your code for that specific login. Select a method and click the button to send either Text Message, Voice, or Email. NOTE: It is recommended that you select Text Message # as your primary option. The other methods are valid, but due to inconsistencies in email policies and practices (such as Spam/Junk folders, server down-time, etc.), a text message will deliver the code immediately.

Screen to request code: Screen after sending the code: After the code is received, enter the code, check the box* and click Continue. You will now be logged in to the system. This option will not show for users who still have approval items pending for the MFA Admin.

* If the box is checked, the next time you log in from this device, a second factor of authentication (code) will not be required for login. As a best practice, this option should only be checked on individual personal computers and should never be checked on a public or shared computer.

Additional Options You may change your SMS, Voice and Email settings at any time by navigating to My Account > My Settings > Change Multi-Factor Authentication. If you enter information that is not already stored in the system, an approval will be needed by an administrator. NOTE: This option may or may not be available to you, depending on how your system is configured.