SlideShare a Scribd company logo
1 of 25
Multi-Factor Authentication
Added protection for a more
secure you
Presenter: Jeff Penn
Multi-factor Authentication (MFA)
Objective
What is Multi-Factor Authentication
Why we need Multi-Factor Authentication
How to register and configure your devices
Multi-factor Authentication (MFA)
What is Multi-Factor Authentication??
Multi-factor authentication, also referred to as advanced or two-
factor authentication, provides an additional layer of security
when logging in or performing transactions online.
When logging in, a user is required to enter a password and
also authenticate using a second factor, typically a phone or
hardware token.
Multi-factor Authentication (MFA)
Multi-factor Authentication (MFA)
Mr. MFA
Multi-factor Authentication (MFA)
Multi-factor Authentication (MFA)
Mr. MFA
Multi-factor Authentication (MFA)
Why do we need it?
• Prevent unauthorized users from logging into your account
• Protect your identity
• Protect your data
• Protect your money!
Multi-factor Authentication (MFA)
Ways of MFA Authentication
• Call your phone (desk or cell)
• Send text message with pass codes to cell
• Use the Duo Mobile app to create a pass code or send a
notification to cell
• YubiKey authentication
Multi-factor Authentication Options
Demonstrations
How do I set this stuff up?!?
1) Registering/Activating MFA on your account
2) Setting up devices for MFA
3) Configuring and using your YubiKey
4) Choosing websites to use MFA
MFA Options – Phone Call
On the MFA homepage, select Add a basic cell phone or home/office phone
Fill out the form and click Continue
• Click on the multi-factor authentication home page link to return home
MFA Options – Phone Call
• Call your phone (desk or cell)
• Select the Call my phone work (or whatever you named it)
– You will receive a call from ‘Toll Free Call’
“Welcome to Duo. If you are not expecting this call, please hangup.
Otherwise, press any key on your phone to login.”
• Press any key on the phone
• Click Enter
MFA Options – Text Message
• Text your cell phone
• Select the Send SMS pass codes to cell
– You will receive a text from a random number with 10 passcodes
• Type any of the 10 passcodes into the MFA screen
MFA Options – Duo Mobile app
• Download the Duo Mobile app from the App Store or Play
Store (Smartphones only)
MFA Options – Duo Mobile app
On the MFA homepage, select Add a basic cell phone or home/office phone
Fill out the form and click Continue
• Click on the multi-factor authentication home page link to return home
MFA Options – Duo Mobile app
In Duo Mobile, click the Add Account button and then click Scan Barcode
Scan the QR code at the bottom of the screen and the Duke University
account will load on your phone. Click Continue on the webpage when
complete.
Click on the multi-factor authentication home page link to return home
MFA Options – Duo Mobile app
On the MFA homepage, select Advanced options and then click Register a
hardware token (YubiKey)
Follow the steps on the OIT page to complete the YubiKey configuration
process.
MFA Options – YubiKey
MFA Options – YubiKey
• Authenticate using a YubiKey
• Place your cursor in the YubiKey field
• Touch the gold circle on your YubiKey for it to auto-populate and log you in
MFA Login
Do I have to authenticate using these MFA methods every time??
No!
When logging in, you have an option to “Remember this device for 12
hours”
Multi-Factor Authentication Homepage
Select the different websites you would like MFA to be
used
Create Temporary Passcodes
See all the devices you have configured
Add/remove devices
More Information
You can access all the information on Multi-factor
Authentication by visiting the TSC website under the
Security link
http://it.fuqua.duke.edu
You can learn more about Multi-Factor Authentication on
OIT’s webpage.
https://idms-mfa.oit.duke.edu/mfa/help
Questions
Any questions?

More Related Content

Similar to multi_factor_authentication_l-l.pptx

Zoliao Visitor Management System
Zoliao Visitor Management SystemZoliao Visitor Management System
Zoliao Visitor Management SystemSunny Tan
 
Two way authentication
Two way authenticationTwo way authentication
Two way authenticationsree valli
 
Two way authentication
Two way authenticationTwo way authentication
Two way authenticationsree valli
 
Two factor authentication_procedure
Two factor authentication_procedureTwo factor authentication_procedure
Two factor authentication_proceduremailkaiser
 
Presentation for bags 10 2019
Presentation for bags   10 2019Presentation for bags   10 2019
Presentation for bags 10 2019BPrice001
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectKeet Sugathadasa
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Universal login
Universal loginUniversal login
Universal loginZx MYS
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?Caroline Johnson
 
NACT's Pincaso (Soft Phone Client Demo)
NACT's Pincaso (Soft Phone Client Demo)NACT's Pincaso (Soft Phone Client Demo)
NACT's Pincaso (Soft Phone Client Demo)Nact Solutions, LLC
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO Alliance
 
White Label Mobile OTT Solutions
White Label Mobile OTT SolutionsWhite Label Mobile OTT Solutions
White Label Mobile OTT SolutionsREVE Systems
 

Similar to multi_factor_authentication_l-l.pptx (20)

Zoliao Visitor Management System
Zoliao Visitor Management SystemZoliao Visitor Management System
Zoliao Visitor Management System
 
Two way authentication
Two way authenticationTwo way authentication
Two way authentication
 
Two way authentication
Two way authenticationTwo way authentication
Two way authentication
 
Two factor authentication_procedure
Two factor authentication_procedureTwo factor authentication_procedure
Two factor authentication_procedure
 
Presentation for bags 10 2019
Presentation for bags   10 2019Presentation for bags   10 2019
Presentation for bags 10 2019
 
WSO2 Telco MCX
WSO2 Telco MCXWSO2 Telco MCX
WSO2 Telco MCX
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connect
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Alae Vision Mobile Overview
Alae Vision Mobile OverviewAlae Vision Mobile Overview
Alae Vision Mobile Overview
 
Buy Verified Venmo Account with best quality
Buy Verified Venmo Account with best qualityBuy Verified Venmo Account with best quality
Buy Verified Venmo Account with best quality
 
Universal login
Universal loginUniversal login
Universal login
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?
 
NACT's Pincaso (Soft Phone Client Demo)
NACT's Pincaso (Soft Phone Client Demo)NACT's Pincaso (Soft Phone Client Demo)
NACT's Pincaso (Soft Phone Client Demo)
 
Your Digital Dollars
Your Digital DollarsYour Digital Dollars
Your Digital Dollars
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
White Label Mobile OTT Solutions
White Label Mobile OTT SolutionsWhite Label Mobile OTT Solutions
White Label Mobile OTT Solutions
 
MFA-Powerpoint.pptx
MFA-Powerpoint.pptxMFA-Powerpoint.pptx
MFA-Powerpoint.pptx
 
UNIT 5-SM.ppt
UNIT 5-SM.pptUNIT 5-SM.ppt
UNIT 5-SM.ppt
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

multi_factor_authentication_l-l.pptx

  • 1. Multi-Factor Authentication Added protection for a more secure you Presenter: Jeff Penn
  • 2. Multi-factor Authentication (MFA) Objective What is Multi-Factor Authentication Why we need Multi-Factor Authentication How to register and configure your devices
  • 3. Multi-factor Authentication (MFA) What is Multi-Factor Authentication?? Multi-factor authentication, also referred to as advanced or two- factor authentication, provides an additional layer of security when logging in or performing transactions online. When logging in, a user is required to enter a password and also authenticate using a second factor, typically a phone or hardware token.
  • 8. Multi-factor Authentication (MFA) Why do we need it? • Prevent unauthorized users from logging into your account • Protect your identity • Protect your data • Protect your money!
  • 10. Ways of MFA Authentication • Call your phone (desk or cell) • Send text message with pass codes to cell • Use the Duo Mobile app to create a pass code or send a notification to cell • YubiKey authentication
  • 12. Demonstrations How do I set this stuff up?!? 1) Registering/Activating MFA on your account 2) Setting up devices for MFA 3) Configuring and using your YubiKey 4) Choosing websites to use MFA
  • 13. MFA Options – Phone Call On the MFA homepage, select Add a basic cell phone or home/office phone Fill out the form and click Continue • Click on the multi-factor authentication home page link to return home
  • 14. MFA Options – Phone Call • Call your phone (desk or cell) • Select the Call my phone work (or whatever you named it) – You will receive a call from ‘Toll Free Call’ “Welcome to Duo. If you are not expecting this call, please hangup. Otherwise, press any key on your phone to login.” • Press any key on the phone • Click Enter
  • 15. MFA Options – Text Message • Text your cell phone • Select the Send SMS pass codes to cell – You will receive a text from a random number with 10 passcodes • Type any of the 10 passcodes into the MFA screen
  • 16. MFA Options – Duo Mobile app • Download the Duo Mobile app from the App Store or Play Store (Smartphones only)
  • 17. MFA Options – Duo Mobile app On the MFA homepage, select Add a basic cell phone or home/office phone Fill out the form and click Continue • Click on the multi-factor authentication home page link to return home
  • 18. MFA Options – Duo Mobile app In Duo Mobile, click the Add Account button and then click Scan Barcode Scan the QR code at the bottom of the screen and the Duke University account will load on your phone. Click Continue on the webpage when complete. Click on the multi-factor authentication home page link to return home
  • 19. MFA Options – Duo Mobile app
  • 20. On the MFA homepage, select Advanced options and then click Register a hardware token (YubiKey) Follow the steps on the OIT page to complete the YubiKey configuration process. MFA Options – YubiKey
  • 21. MFA Options – YubiKey • Authenticate using a YubiKey • Place your cursor in the YubiKey field • Touch the gold circle on your YubiKey for it to auto-populate and log you in
  • 22. MFA Login Do I have to authenticate using these MFA methods every time?? No! When logging in, you have an option to “Remember this device for 12 hours”
  • 23. Multi-Factor Authentication Homepage Select the different websites you would like MFA to be used Create Temporary Passcodes See all the devices you have configured Add/remove devices
  • 24. More Information You can access all the information on Multi-factor Authentication by visiting the TSC website under the Security link http://it.fuqua.duke.edu You can learn more about Multi-Factor Authentication on OIT’s webpage. https://idms-mfa.oit.duke.edu/mfa/help