This site requires JavaScript to be enabled
An updated version of this article is available

Multi-Factor Authentication (MFA) : Getting Started

286 views

44.0 - Updated on 2023-11-14 by Gary Edward Ward

43.0 - Updated on 2023-09-29 by Gary Edward Ward

42.0 - Updated on 2023-09-27 by Gary Edward Ward

41.0 - Updated on 2023-08-29 by Scott R Richardson

40.0 - Updated on 2023-08-16 by Gary Edward Ward

39.0 - Updated on 2023-08-16 by Gary Edward Ward

38.0 - Updated on 2023-08-14 by Scott R Richardson

37.0 - Updated on 2023-08-14 by Gary Edward Ward

36.0 - Updated on 2023-08-14 by Gary Edward Ward

35.0 - Updated on 2023-08-14 by Gary Edward Ward

34.0 - Updated on 2023-08-14 by Gary Edward Ward

33.0 - Updated on 2023-08-14 by Gary Edward Ward

32.0 - Updated on 2023-08-14 by Gary Edward Ward

31.0 - Updated on 2023-08-11 by Gary Edward Ward

30.0 - Updated on 2023-08-11 by Gary Edward Ward

29.0 - Updated on 2023-08-10 by Gary Edward Ward

28.0 - Updated on 2023-08-10 by Gary Edward Ward

27.0 - Updated on 2023-08-10 by Gary Edward Ward

26.0 - Updated on 2023-08-10 by Gary Edward Ward

25.0 - Updated on 2023-08-10 by Gary Edward Ward

24.0 - Updated on 2023-08-10 by Gary Edward Ward

23.0 - Updated on 2022-10-19 by Gary Edward Ward

22.0 - Updated on 2022-10-19 by Gary Edward Ward

21.0 - Updated on 2022-08-31 by Gary Edward Ward

20.0 - Updated on 2022-04-21 by Aaron B Reiser

19.0 - Updated on 2021-11-15 by Aaron B Reiser

18.0 - Updated on 2021-11-02 by Aaron B Reiser

17.0 - Updated on 2020-12-15 by Aaron B Reiser

16.0 - Updated on 2020-08-18 by Aaron B Reiser

15.0 - Updated on 2020-08-12 by Aaron B Reiser

14.0 - Updated on 2020-08-05 by Aaron B Reiser

13.0 - Updated on 2020-07-06 by Gary Edward Ward

12.0 - Updated on 2020-07-01 by Aaron B Reiser

11.0 - Updated on 2020-06-30 by Gary Edward Ward

10.0 - Updated on 2020-06-15 by Aaron B Reiser

9.0 - Updated on 2020-06-12 by Scott R Richardson

8.0 - Updated on 2020-06-12 by Scott R Richardson

7.0 - Updated on 2020-06-12 by Gary Edward Ward

6.0 - Updated on 2020-05-12 by Aaron B Reiser

5.0 - Updated on 2020-05-11 by Aaron B Reiser

4.0 - Updated on 2020-05-08 by Aaron B Reiser

3.0 - Updated on 2020-05-07 by Aaron B Reiser

2.0 - Updated on 2020-05-01 by Aaron B Reiser

1.0 - Authored on 2020-05-01 by Aaron B Reiser

Table of Contents

Duo Help Video from ITS

What is Multi-Factor Authentication (MFA)?

Why am I being asked to complete MFA?

Available Authentication Methods

Registering Backup Devices

Registration Steps for New Users

Registering Other Devices

 

Back to MFA Knowledge Base

 

Duo Help Video from ITS

In the video below, UT’s Information Technology Services (ITS) introduces Duo, a multi-factor authentication service. Duo is used as an extra layer of security to make logins more secure.

To learn more about Duo and how to use it, you can view the videos below. Closed captioning is available via the [CC] button.

 

 

Back to Top

 

 

What is Multi-Factor Authentication (MFA)?

Authentication is the process by which a system determines that you are who you claim to be.

There are multiple factors of authentication, which can be broken down into categories like such:

  • Something you know, such as a password.
  • Something you have, such as your mobile phone.
  • Something you are (i.e., biometrics), such as your fingerprint.

When you use more factors of authentication, the system can be more confident that you are who you claim to be, leading to better security.

For example, your password might be comprised when a web site gets hacked, but with multi-factor authentication that password is useless without your mobile phone.

Back to Top

 

 

Why am I Being Asked to Complete MFA?

To better protect the security of your online information, the university has implemented MFA using the Duo product. This system will come up when you log into any university web application protected by MFA.

Before you can complete the authentication process, you will need to enroll a device. The recommended device is a smartphone or tablet, such as an iPhone or Android device.

If you have not enrolled a device please follow the instructions below. You will need your chosen device handy to complete this process.

 

Back to Top

 

 

Available Authentication Methods

Authentication Method

Description

Duo Push Pushes a request to your phone or tablet (if you have the Duo Mobile application installed and activated on your iOS, Android, or Windows Phone device). Just review the request and tap Approve.
Call Me Receive a phone call and follow the instructions.
Enter a Passcode Enter a passcode, generated with the Duo Mobile application, sent to you via SMS text, or generated by your hardware token. Click the Enter a Passcode to make use of this functionality.
Use Touch ID

In order to use Apple Touch ID, make sure you have the following:

Use Security Key

Authenticate with a touch of a button (no passcode needed).

The generic term is "security key" and one example is the YubiKey, a product made by YubiCo.

Note regarding security keys:

  • Security keys sold by the Campus Computer Store are configured for the university's MFA service and are incompatible with the YubiCloud OTP validation infrastructure.
  • Not consistently supported in Chrome (known to work in Edge, Firefox, and Safari).
Use Hardware Token

Authenticate with a one time passcode generated from a portable hardware token.  The generic term is "hard token" or "token".

  • Hard Tokens configured for the university's MFA service can be purchased at the Campus Computer Store under product ID#1867833

 

Back to Top

 

 

Registering Backup Devices

The university strongly recommends that you register more than one device.

  • In the event that your primary device is lost/stolen/broken, you can use your backup device to remove the lost/stolen/broken device and add a new one.
  • In the event that your smartphone or tablet is reset to factory settings, you can use your backup device to remove and re-add that smartphone or tablet.
  • If you do not configure a backup device, you will need to contact the UT Service Desk if your only device becomes lost, stolen, broken, or reset.

 

Back to Top

 

 

Registration Steps for New Users

The first step in registration is to enroll your device using your UT EID. The device you enroll will be used when you are prompted to authenticate by university web applications protected by MFA.

Follow the instructions below to register your mobile phone or landline. 

Register Your Mobile Phone or Landline (Click to Expand/Collapse)

1. Click HERE to go to the Self-Registration Portal.

 

2. Sign on with your UT EID and EID password.

3. You will then be automatically redirected to the setup. Select "Next" to start setup. 

 

4. After a few data safety tips, you will be prompted to select a Duo option to use for authentication. "Duo Mobile" which utilizes the app is recommended. 

 

5. Select the correct Country Code and input your number. Once done select "Add phone number". On the next page verify that it is correct, and click "Yes, it's correct" 

 

6. If you chose the "Phone Number" method you are all setup and ready to go. If you chose "Duo Mobile," navigate to your devices App Store and install the Duo Mobile app and select "next" 

 

7. Select "+Add" in your Duo app to scan the QR code that appears. Once scan, a confirmation screen will appear letting you know your device is setup. 

 

8. Once you continue, setup is now complete. 

Back to Top

 

 

Registering Other Devices

For help registering other devices with Duo, please visit our Device Management article in the link below:

 

Note: Do not use the comments box below to request technical support. Please contact the UT Service Desk for assistance.

 

 

Back to Top