MFA: Difference between revisions
Jump to navigation
Jump to search
(Created page with "{{Note | This page is a work in progress, and covers a feature currently being tested/deployed}} Multi-factor authentication (MFA) is a method of confirming a user's claimed i...") |
No edit summary |
||
Line 1: | Line 1: | ||
{{Note | This page is a work in progress, and covers a feature currently being tested/deployed}} | {{Note | This page is a work in progress, and covers a feature currently being tested/deployed.}} | ||
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism. Valid factors include: | Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism. Valid factors include: | ||
* knowledge (something they and only they know) | * knowledge (something they and only they know) | ||
Line 5: | Line 5: | ||
* inherence (something they and only they are) | * inherence (something they and only they are) | ||
UMIACS | UMIACS utilizes the Duo security platform to allow mobile devices to serve as a second factor. | ||
== Common Tasks == | == Common Tasks == | ||
* Getting Started | * Getting Started | ||
* [[MFA/Duo_Recovery | Replacing a lost Duo MFA device | * [[MFA/Duo_Recovery | Replacing a lost Duo MFA device]] |
Revision as of 20:04, 1 October 2018
This page is a work in progress, and covers a feature currently being tested/deployed. |
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism. Valid factors include:
- knowledge (something they and only they know)
- possession (something they and only they have)
- inherence (something they and only they are)
UMIACS utilizes the Duo security platform to allow mobile devices to serve as a second factor.
Common Tasks
- Getting Started
- Replacing a lost Duo MFA device