3/20/2024 0 Comments Duo mobile app help centerIf you have not done so already, when you see the screen to Install Duo Mobile log into your smartphone and install the Duo Mobile application. Once the Duo mobile app is installed, click I have Duo Mobile installed. Select the type of smartphone you are using and click Continue. Please review to the Add a New Device for assistance.Įnter your cell phone number and click Continue. Note: Although our recommendation is to use the Duo Mobile app on a mobile device for authenticating, Duo does allow multiple ways to authenticate, including Touch ID. If you do select Touch ID, you will not be able to use this option with Respondus Lockdown browser. Select the type of device you are adding and click Continue. Duo provides information for using the app with other online services and accounts.Once the app is installed, visit the enrollment website on a computer, enter your SHSU credentials to login and then click Start Setup. And, in most cases, you can use Duo to access those accounts. Can I Use Duo on My Personal Accounts?Ībsolutely! We encourage you to use multifactor authentication on any personal accounts (e.g., banks, credit cards, social media, etc.) that provide the option. Multi-factor authentication using Duo gives KU an affordable and simple way to ensure all faculty and staff can do their part to protect their own data, as well as that of colleagues, students and other stakeholders. In an increasingly complex digital world, username and password alone are not enough to stop hackers and data thieves. Why is KU Using Duo MFA?Ĭollectively as an institution and as individuals we have a legal and ethical obligation to protect private, confidential and sensitive data to the best of our ability. If the mobile app is not an option for you, please contact your IT Support Staff or the IT Customer Service Center to discuss your options. It’s that simple! Using the Duo app on your smartphone is the easiest and most convenient way to confirm your identity. Confirm your identity through the Duo app, and you will be logged in. After entering your KU Online ID and password, you will be prompted to verify your identity using Duo. Once you are enrolled and have set up Duo, log in to any KU system via single sign-on (SSO) as usual. You don't have to wait! You can sign up and start using Duo MFA right away by downloading the Duo app now to your Apple or Android mobile device and following the instructions at duosetup.ku.edu to activate Duo on your KU account. This will delay access and you may be locked out of KU systems if you haven’t set up Duo in advance. If you don’t enroll in before the activation deadline, the first time you log in to a protected KU system after the deadline you will be prompted to enroll in Duo. When it's your turn, you will receive an email giving you a week to download the Duo app and enroll your mobile device in Duo. Our process is based on the successful enrollment process Kansas State University used with their students last year. 29 and continuing throughout the semester, we will activate Duo for groups of students each day. When Will I Have to Start Using Duo?īeginning on Jan. When everyone participates in multifactor authentication, it strengthens security campuswide. KU faculty, staff, graduate research assistants, graduate teaching assistants and graduate assistants, individuals using sponsored temporary accounts and undergraduate student employees at the request of their department have been using Duo since 2019.ĭuo for students represents an important step in providing consistent and equitable protection across our Jayhawk community. In spring 2024, we will start requiring all students to use Duo when logging into KU systems. Logging into multifactor authentication requires something you know (i.e., your KU Online ID and password) and something you have (i.e., Duo app or text codes on your mobile phone). KU has partnered with Duo to provide multifactor authentication on the Lawrence/Edwards campus. Multifactor authentication (MFA) strengthens protections by requiring an additional layer of security beyond username and password when accessing systems. The most common point of entry for attackers is stolen user names and passwords. Data breaches make headlines almost daily.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |