This site requires JavaScript to be enabled
An updated version of this article is available

Multi-Factor Authentication (MFA) : Getting Started

464 views

50.0 - Updated on 2024-10-09 by Sophie Corless

49.0 - Updated on 2024-07-05 by Scott Richardson

48.0 - Updated on 2024-07-03 by Sophie Corless

47.0 - Updated on 2024-05-16 by Sophie Corless

46.0 - Updated on 2024-05-16 by Sophie Corless

45.0 - Updated on 2024-05-16 by Sophie Corless

44.0 - Updated on 2023-11-14 by Gary Ward

43.0 - Updated on 2023-09-29 by Gary Ward

42.0 - Updated on 2023-09-27 by Gary Ward

41.0 - Updated on 2023-08-29 by Scott Richardson

40.0 - Updated on 2023-08-16 by Gary Ward

39.0 - Updated on 2023-08-16 by Gary Ward

38.0 - Updated on 2023-08-14 by Scott Richardson

37.0 - Updated on 2023-08-14 by Gary Ward

36.0 - Updated on 2023-08-14 by Gary Ward

35.0 - Updated on 2023-08-14 by Gary Ward

34.0 - Updated on 2023-08-14 by Gary Ward

33.0 - Updated on 2023-08-14 by Gary Ward

32.0 - Updated on 2023-08-14 by Gary Ward

31.0 - Updated on 2023-08-11 by Gary Ward

30.0 - Updated on 2023-08-11 by Gary Ward

29.0 - Updated on 2023-08-10 by Gary Ward

28.0 - Updated on 2023-08-10 by Gary Ward

27.0 - Updated on 2023-08-10 by Gary Ward

26.0 - Updated on 2023-08-10 by Gary Ward

25.0 - Updated on 2023-08-10 by Gary Ward

24.0 - Updated on 2023-08-10 by Gary Ward

23.0 - Updated on 2022-10-19 by Gary Ward

22.0 - Updated on 2022-10-19 by Gary Ward

21.0 - Updated on 2022-08-31 by Gary Ward

20.0 - Updated on 2022-04-21 by Aaron Reiser

19.0 - Updated on 2021-11-15 by Aaron Reiser

18.0 - Updated on 2021-11-02 by Aaron Reiser

17.0 - Updated on 2020-12-15 by Aaron Reiser

16.0 - Updated on 2020-08-18 by Aaron Reiser

15.0 - Updated on 2020-08-12 by Aaron Reiser

14.0 - Updated on 2020-08-05 by Aaron Reiser

13.0 - Updated on 2020-07-06 by Gary Ward

12.0 - Updated on 2020-07-01 by Aaron Reiser

11.0 - Updated on 2020-06-30 by Gary Ward

10.0 - Updated on 2020-06-15 by Aaron Reiser

9.0 - Updated on 2020-06-12 by Scott Richardson

8.0 - Updated on 2020-06-12 by Scott Richardson

7.0 - Updated on 2020-06-12 by Gary Ward

6.0 - Updated on 2020-05-12 by Aaron Reiser

5.0 - Updated on 2020-05-11 by Aaron Reiser

4.0 - Updated on 2020-05-08 by Aaron Reiser

3.0 - Updated on 2020-05-07 by Aaron Reiser

2.0 - Updated on 2020-05-01 by Aaron Reiser

1.0 - Authored on 2020-05-01 by Aaron Reiser

Multi-Factor Authentication (MFA):
Getting Started

Duo Help Video from ITS

What is Multi-Factor Authentication (MFA)?

Why am I being asked to complete MFA?

Remember Me

Available Authentication Methods

Registering Backup Devices

Registration Steps for New Users

Registering Other Devices


Back to MFA Knowledge Base


Duo Help Video from ITS

Duo Help Video from ITS from FAS Communications on Vimeo.

In this video, UT’s Information Technology Services (ITS), introduces Duo, a multi-factor authentication service. Duo is used as an extra layer of security to protect sensitive information. Essentially, it is a second secure log in. Watch this video to see how to set up Duo.

A transcript of this video is available in the video description on the video's Vimeo page.


What is Multi-Factor Authentication (MFA)?

Authentication is the process by which a system determines that you are who you claim to be.

There are multiple factors of authentication, which can be broken down into categories like such:

When you use more factors of authentication, the system can be more confident that you are who you claim to be, leading to better security.

For example, your password might be comprised when a web site gets hacked, but with multi-factor authentication that password is useless without your mobile phone.


Why am I being asked to complete MFA?

To better protect the security of your online information, the university has implemented MFA using the Duo product. This system will come up when you log into any university web application protected by MFA.

Before you can complete the authentication process, you will need to enroll a device. The recommended device is a smartphone or tablet, such as an iPhone or Android device.

If you have not enrolled a device please follow the instructions below. You will need your chosen device handy to complete this process.


Remember Me

The Duo product includes a "Remember Me" function which can greatly reduce the number of times you need to use Multi-Factor Authentication to sign on.

Duo - Remember Me for 30 Days from FAS Communications on Vimeo.


This feature is explained in more detail (including limitations and troubleshooting) in the following article:


Available Authentication Methods


Method Description
Duo Push Pushes a request to your phone or tablet (if you have the Duo Mobile application installed and activated on your iOS, Android, or Windows Phone device). Just review the request and tap Approve.
Call Me Receive a phone call and follow the instructions.
Enter a Passcode Enter a passcode, generated with the Duo Mobile application, sent to you via SMS text, or generated by your hardware token. Click the Enter a Passcode to make use of this functionality.
Use Touch ID

In order to use Apple Touch ID, make sure you have the following:

Use Security Key

Authenticate with a touch of a button (no passcode needed).

The generic term is "security key" and one example is the YubiKey, a product made by YubiCo.

Note regarding security keys:

  • Security keys sold by the Campus Computer Store are configured for the university's MFA service and are incompatible with the YubiCloud OTP validation infrastructure.
  • Not consistently supported in Chrome (known to work in Edge, Firefox, and Safari).
Use Hardware Token

Authenticate with a one time passcode generated from a portable hardware token.  The generic term is "hard token" or "token".

  • Hard Tokens configured for the university's MFA service can be purchased at the Campus Computer Store under product ID#1867833


Registering Backup Devices

The university strongly recommends that you register more than one device.


Registration Steps for New Users

The first step in registration is to enroll your device using your UT EID.

The device you enroll will be used when you are prompted to authenticate by university web applications protected by MFA (e.g., Workday).

The instructions below will guide you through the setup.

1. Click HERE to go to the Self-Registration Portal.


2. Sign on with your UT EID and EID password.

Screenshot of the "Sign in with your UT EID" prompt.


3. Select the "Start Setup" button.

Screenshot of the "Protect Your University of Texas at Austin Account" prompt.


4. Next, select "Mobile Phone" or "Landline".

Screenshot of the "What type of device are you adding?" prompt.


5. Input your number, verify that it is correct, and hit continue.

Screenshot of the "Enter your phone number" prompt.


6. If you chose "landline" you are all setup and ready to go. If you chose "mobile phone," specify your device type and hit continue.

Screenshot of the "What type of phone is...?" prompt.


7. If you already have the Duo Mobile application installed on your phone, select "I have Duo Mobile Installed".

  • If you have not installed the Duo Mobile application, select that option.

Screenshot of the "Install Duo Mobile" prompt with the "I have Duo Mobile installed" button highlighted.


8. A QR code will appear. Open Duo Mobile.  Tap the "+" button. Scan the QR code on the screen.

Screenshot of the "Active Duo Mobile" prompt with a sample QR code displayed.


Registering Other Devices

For help registering other devices with Duo, please visit our Device Management article in the link below:


Back to the Multi-Factor Authentication Knowledge Base