![]() ![]() ![]() Third-Party Accounts and Servicesĭuo Mobile goes beyond St. Acknowledge the notification on your device or enter the passcode as requested. In a situation where you do not have access to data on your device, you can still use the passcode provided in the Duo Mobile application to sign-in.ģ. Specify whether you’d like to receive a push notification, or passcode from your Duo token or Duo Mobile app. You will be prompted each time you sign into SLC.me to validate your identity with Duo.Ģ. Scroll to the bottom of the page, and click on “start setup now”ġ.Either enter a passcode or send a push notification to proceed. You must authenticate with an existing device before adding a new one.From the slide-out menu, choose Add a new device.Sign into SLC.me but before entering your Duo hardware passcode, click onto Settings.Note: Do not start the registration from a smartphone or tablet since the process involves scanning a QR code that is displayed on the computer screen. If you are missing your token (whether you are new to the college or never received one) please contact the IT Service Desk ( or extension 4357). Setting Up Duo with your SLC.me AccountĮvery staff and faculty account will be Duo enabled and have a hardware token assigned to the user. Should someone steal your password and attempt to use your account to access SLC.me they will be denied access without your Duo token or Duo Mobile application. This is accomplished by using your SLC username and password (something you know) with a Duo token, or Duo Mobile application running on a smartphone or tablet (something you have). Once your SLC account is MFA-enabled, your login to SLC.me and the applications within it are protected by Duo. It relies on something you know and something you have. Duo multi-factor authentication (MFA) is a proven technique to prevent your account from being used in these attacks. SLC’s internet-accessible services are constantly subject to illicit login attempts from people seeking to install malware and ransomware, searching for mailboxes from which to send spam, hunting for data for identity theft, or attempting to steal intellectual property. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |