Two-Factor Autentication myUTSA ID+ It takes two!.

Slides:



Advertisements
Similar presentations
Module: 201 Create and Manage Your Agent Account.
Advertisements

McAfee One Time Password
Assigning Pager Coverage. Go to Smart Web via MAH portal and select “Pager”
Copyright JANET(UK) JANET txt & JANET 3G. Copyright JANET(UK) Simple, intuitive, web-based messaging Secure online address book Individual.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Dartmouth PKI Certificate Deployment June 2004 Fed Ed Meeting.
Two Factor Authentication (TFA) is a 100% Open Source, free to use security system for your Joomla site’s backend. Two Factor Authentication works in.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
Multi-Factor Authentication Added protection for a more secure you Presenter: Jeff Penn.
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
By Anthony McDougle and Loren Klingman.  The average user does not have secure passwords ◦ Simple passwords ◦ Reusing the same password ◦ Never changing.
The Office of Information Technology Two-Factor Authentication.
Hot Topic—Tech Tools and Tips Katherine Greene, Wheat Law Library, University of Kansas School of Law 50 th Annual Meeting, Sunday, April.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Information Security for Managers (Master MIS)
IT Help Desk Peralta Community College District Accessing Systems.
Confidential - © 2012 StreamWIDE © StreamWIDE
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
HOW-TO guide This tutorial has sound.
OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office
User Microsoft Account Ex: User Organizational Account Ex: Microsoft Account Microsoft Azure Active Directory.
Accessing Your “How To” Series – W&J Office of Communications.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
ITA/ISA Monthly Meeting March 20, 2015 Facilitator: David Miller Manager – OIT Support Services.
Text-a-Tip See something? Do something.. TipSoft SMS – How To Videos
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
The Qwicky App By: Arjenis, Blerta, Randy, & Christina.
FILE 5 DOSSIER PAYMENTS IN THE DIGITAL WORLD. ESSENTIAL VOCABULARY Cash – liquid money Ecash, digital cash, cybercash – digital cash in the new economy.
D IGITAL S OLUTIONS FOR D IGITAL P ATRONS. Join the digital age – patron scanning Library Document Station™
Duo UI Demo Christopher Bongaarts. CONTEXT/MOTIVATION Two-factor auth already in use –“M Key” – Safeword Silver tokens, Safeword PremierAccess software.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Do Students Want Mobile Library Access And Are Librarians Ready to Deliver? Electronic Resources & Libraries, February 28, 2011 Angela Dresselhaus, Electronic.
Time-base One-time Password Eddy Kleinjan, Data Access Europe.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Talking Points Provides EY people with greater working flexibility and collaboration opportunities. EY people can have access to technology that enables.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Accessing HRMS Off Campus Two-Factor Authentication and Wyosecure.
Mobile PKI ● Demo ● Overview / Terminology ● Use cases ● Trust ● Costs ● Feedback.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Information Technology Services (ITS)
Implementing and Managing Azure Multi-factor Authentication
CLOUDENTIFY.
ArchPass Duo Presentation
Technology and You!.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Two Factor Authentication (2FA)
ActivID Tap Authentication HID Global
INFORMATION TECHNOLOGY
Office of Financial Affairs
Two-factor authentication
2-Factor Authentication Update
Multifactor Authentication
IT Services for Students Community College of Rhode Island
IT Services for Students Community College of Rhode Island
Call for Skype Help Password Recovery Skype Support.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Taewan kang, Kevin huangfu
Office 365 Identity Management
Multifactor Authentication & First Time Login
smartmail & smartportal: Introducing Two-Factor Authentication
Students will be required to register with DUO according to the following schedule: Students with last names beginning with A - F: 9am on 10/24/2018 G.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Authentication & the Web
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Multi-Factor Authentication
Presentation transcript:

Two-Factor Autentication myUTSA ID+ It takes two!

What is myUTSA ID+ ? Something you have Something you know Required for access to UT Share PeopleSoft and UTSA VPN services Provided by Duo Security

Enroll and Authenticate Enroll Mobile phones Land lines Tokens Key fobs (currently testing) Authenticate Simple and clean user experience Variety of second factors Flexible for many applications

Provide the Second Factor Duo Push Mobile phone app Tablets too Land Line A phone call is made to the land line phone you enroll Text Message A one-time password (OTP) is sent to your phone via SMS text messaging Token USB token Key Fob Coming soon

Applications VPN UT Share PeopleSoft Soon … Faculty tab on ASAP Future Blackboard Learn Air Rowdy Wireless Outlook Web Access Digital Measures Library Applications

Questions?

Kevin Kjosa Information Security Officer x7974

Who Else Uses Duo?