Multi-Factor Authentication for first time users



Similar documents
Multi-Factor Authentication Job Aide

Yubico Authenticator User's Guide

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Step 1. Step 2. Open your browser and go to and you will be presented a logon screen show below.

USER MANUAL. v Windows Client January

Multi-Factor Authentication FAQs

Configuring a YubiKey for the YubiCloud

Cash Management 5.0 User Guide

New Online Banking Guide for FIRST time Login

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

YubiKey & OATH- TOTP Verification

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two-Factor Authentication

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)

Business Mobile Banking

An Introduction to Box.com

Using Devices. Chapter 3

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

How to Set Up Your. Account

Online Statements. About this guide. Important information

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

Your guide to the HSBC Digital Security Device. HSBC Bank USA, N.A All rights reserved.

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

Wind River Financial iprocess Setup Guide for Android Devices

Department of Public Health S A N F R A N C I S C O

Two-Factor Authentication

Smarter Balanced Assessment Consortium:

Two Factor Authentication - USER GUIDE

September 25, Programming YubiKeys for Okta Adaptive Multi-Factor Authentication

Quick Start Guide to Logging in to Online Banking

Electronic Questionnaires for Investigations Processing (e-qip)

Booth Gmail Configuration

How to Access Coast Wi-Fi

User Guide Vodafone Pocket WiFi Pro. Designed by Vodafone

BOTTOM UP THINKING SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

Smart TPM. User's Manual. Rev MD-STPM-1001R

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

Step-by-Step Instructions Download and Transfer of OverDrive Titles to Devices!

The Coast to Coast AM Podcast for itunes 11

AWS Account Management Guidance

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users Charging your PayClip. 2. Downloading the PayClip app.

Welcome to GIFTS Online Mobile... 3

Hot Spot (Unsecured) Wireless Access Initial Setup and Login for MCC_HOTSPOT

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time)

Gate City Bank Online Business Banking i

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

Welcome to Business Internet Banking

MCBDirect Corporate Logging on using a Soft Token

DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:

Mobility with Eye-Fi Scanning Guide

The Rush 24/7 Podcast for itunes 11

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Setting Up and Accessing VPN

IMAP and SMTP Setup in Clients

MelbourneOnline Hosted Exchange Setup

Device LinkUP + Desktop LP Guide RDP

setup information for most domains hosted with InfoRailway.

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015

Citizens 1 st National Bank Mobile Banking FAQ

VPN Web Portal Usage Guide

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS

Representative Console for Android Phone. Version 2.1

Introduction Download and Install Mobile Application About Logging In Springboard Navigation List Pages...

Novell Filr 1.0.x Mobile App Quick Start

/ 1. Online Banking User Guide SouthStateBank.com / (800)

User Guide Vodafone Mobile Wi-Fi R210. Designed by Vodafone

User Guide Vodafone Mobile Wi-Fi R206-Z. Designed by Vodafone

Google 2 factor authentication User Guide

Hallpass Instructions for Connecting to Mac with a Mac

Not a smoke detector! STK3350 instructions

NetIQ Advanced Authentication Framework - Smartphone Applications

Connecting Software Connect Bridge - Mobile CRM Android User Manual

Using the Jive for ios App

P WEBSITE P CATALOGUES P PRICE GUIDES P ONLINE CLOUD STORAGE P e-commerce System. Printed and Electronic (e-documents) Users Guide. vbradug

User Guide for eduroam

1. Scope of Service. 1.1 About Boxcryptor Classic

Two Factor Authentication and PKI Token (for Windows)

User Guide Vodafone Mobile Wi-Fi R206-Z. Designed by Vodafone

How to get Office 365 through your Student

2010 Outlook Web App Client Overview

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Yale Software Library

Using GhostPorts Multi-Factor Authentication

Wind River Financial iprocess Setup Guide for IOS Devices

Cloud Print Edition Quick Start Guide

A Quick and Easy Guide to PERSONAL ONLINE BANKING

UNIFIED COMMUNICATIONS POST-MIGRATION INSTRUCTIONS

Mobile App Frequently Asked Questions

How to download library ebooks to your Tablet. 1. Get the OverDrive app for your device

OS X LION SET UP THE SYSTEM

The Rush 24/7 Podcast for itunes 9

Amcrest 960H DVR Quick Start Guide

What does the First Mobile app do for me? What else can I do with the mobile banking app beyond the basics? Why should I use the mobile banking app?

Remote Viewer Recording Backup

Manual for Android 1.5

Transcription:

Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor authentication, also referred to as advanced or two-factor authentication, providing an additional layer of security when logging in or performing transactions online. When logging in, a user is required to enter a password and also authenticate using a second factor, typically a phone or hardware token. Simplified MFA requires a user to enter a secondary password when logging into specific Duke websites. This secondary password can be retrieved through your office/home phone, cell phone, mobile device, the smartphone Duo Mobile app, or by using a hardware token called a YubiKey. If you do not have access to any of these resources, a user can also retrieve temporary pass codes that can be used for a 72-hour period. What does a MFA login look like? When accessing a website that requires MFA to login, once a user types in their NetID, an additional field will appear under the password called Advanced Verification. This Advanced Verification section will offer the different ways in which you can retrieve your MFA information, either via a radio button selection or by inputting a passcode or YubiKey information in the text field. To prevent a user from having to use MFA every time they log into a MFA protected Duke website, check the box next to Remember this device for 12 hours and this specific machine will now longer require MFA for the next 12 hours. A user may select which Duke websites require MFA on the Multi-Factor Authentication website but the OIT Self Service page and the Duke@Work page are required.

Configuring Multi-Factor Authentication **It is recommended that you configure MFA at your home/office so you have access to your home/office phone for initial configuration** Home/Office phone Configuration 1) Log onto the OIT Self Service website by going to http://oit.duke.edu/selfservice. 2) Once on the OIT Self Service page, click on the Multi-Factor Authentication link located on the right. 3) This will take you to a security challenge-response question page. These questions are used for password recovery or retrieving temporary MFA pass codes. Fill out the form and then press Continue.

4) On the Add phone or tablet page, enter the following: -In the first dropdown, select Home/office phone -Enter your 10 digit home or office phone number -Leave the Extension field blank -Give this phone a nickname (Home phone or Office phone) 5) This takes you to a completion page that shows you the new MFA options you will see in the Advanced Verification section and what they will do. Click on the preferences page link to take you to the Multi- Factor Authentication website.

Smart Phone Configuration 1) If you re not already there, log into the OIT Self Service website by going to http://oit.duke.edu/selfservice. Click on the Multi-Factor Authentication link on the right. 2) On the OIT Self Service website, click on the Add a smartphone or tablet link located on the right under the Manage Devices section. 3) On the Add phone or tablet page, enter the following: -In the first dropdown, select Smart phone -Select your phone operating system -Enter your 10 digit smart phone number -Give this phone a nickname (Cell phone)

4) This will direct you to a page asking you to download and install the Duo Mobile app. This is a free app that can be downloaded in the Google Play Store (Android devices) or the App Store (Apple devices). 5) On your smart phone, open the Duo Mobile app once installation is complete. Click on the Add Account button which will turn on the camera on the phone. If the app asks for permission to use the camera feature, select Yes. 6) Back on the Multi-Factor Authentication website, scroll to the bottom of the page where you will see a QR code. Hold your mobile phone in front of the screen so the camera will see and scan the QR code. No need to press any buttons, once the QR code is in focus it will recognize it.

7) You should now see Duke University listed in your Duo Mobile app. 8) Click Continue on the MFA smart phone setup page and you will be taken to a completion page that shows you the new MFA options you will see in the Advanced Verification section and what they will do. Click on the multi-factor authentication home page link to take you to the Multi-Factor Authentication website.

Generate Temporary Pass codes If you are unable to use any the MFA resources needed to login, you can generate temporary pass codes that will last for 72-hours and will allow you to login in. 1) When you go to a Duke website that requires MFA to login, type in your NetID so the Advanced Verification section will appear and then click on the What are pass codes? Link. 2) This will take you to an OIT FAQ page for Multi-Factor Authentication explaining what pass codes are. On the third bullet point for Temporary pass codes, click on the multi-factor authentication home page link in the last sentence. 3) This will take you to a login page that only requires your NetID and password.

4) Once logged in, this will take you to a page where you will need to answer a couple security questions you configured at the start of this guide. Answer the questions and press Submit. 5) You will now be giving 10 temporary pass codes that are good for a 72-hour period. Each pass codes may only be used once. 6) Go back to the MFA protected Duke website, log in with your NetID and password and then enter one of the temporary pass codes in the text field under the Advanced Verification field to login.

YubiKey Configuration A YubiKey is a hardware token that looks similar to a portable USB thumb drive. It is registered to the user s NetID account and can be used on any computer. A user will plug the Yubikey into a USB slot and touch the gold circle to create a pass code to authenticate. 1) If you re not already there, log into the OIT Self Service website by going to http://oit.duke.edu/selfservice. Click on the Multi-Factor Authentication link on the right. 2) Click on the Advanced Options link located under the Manage Devices section and then click on Register a hardware token (YubiKey).

3) This will take you to a 12 step guide on how to configure your YubiKey. Start by clicking on the link in Step 1 to direct you to a website to Download the YubiKey Personalization Tool. 4) On the Yubico website, scroll down to the 4 th section titled Yubikey Personalization Tool and click on the Microsoft Windows Download link (for Windows machines) or the Mac OS X Download link )for Mac machines). Save and run the file to install the Yubikey Personalization Tool. 5) Plug your YubiKey into your computer. If you do not have a YubiKey, contact the TSC and they will provide you with one.

6) Open up the YubiKey Personalization Tool by going to the Start menu and typing in YubiKey in the search field. For Mac users, open your Spotlight search by clicking on the magnifying glass in the upper right and then typing YubiKey. Make sure the YubiKey Personalization Tool says YubiKey is inserted in the upper right and then click on the Yubico OTP Mode in the center of the window. 7) On the next screen, click on the Quick button.

8) This will take you to the configuration page for your YubiKey. 9) Under the Configuration Slot section, select the Configuration Slot 1 radio button. 10) Under the Yubico OTP Parameters section, click on the Regenerate button 2-3 times to make sure it gives you new values.

11) Uncheck the Hide Values box. 12) Click the Write Configuration button. 13) On the pop-up window, click Yes to overwrite configuration slot 1 and then click Cancel when asked to save a configuration file. 14) Look back to the 12 step OIT guide to configuring your YubiKey and scroll down to the bottom. You will see Step 12 asks for 4 different text inputs.

15) You will find these inputs on the YubiKey Personalization Tool. Go ahead and input those values into the fields in Step 12. Leave the Optional field blank and press Register YubiKey when complete. 16) This will take you to a completion page where you can click on the multi-factor authentication home page link to take you back to the home page.

17) To authenticate using the YubiKey, make sure it is first plugged into the computer. When you navigate to a MFA protected Duke website, enter your NetID and password and then place your cursor into the text box under the Advanced Verification section. When your cursor is in the text box, touch the gold circle on your YubiKey for about a second and encrypted text will auto-fill and log you into the site.

Quick Multi-Factor Authentication Homepage Overview The Website Preferences section on the left is where you can select which sites you would like MFA to be used for. Duke requires that you have MFA on the OIT Self Service page as well as the Duke@Work website. The Manage Devices section on the right is where you can manage which devices are set up for MFA as well as adding or removing devices.