![]() A "keychain" hardware token displays two-step codes at a push of a button.Mobile phones with SMS text messaging capability.Duo Mobile push notification (recommended). ![]() Each device has one or more authentication methods available. There are seven physical devices that you can use to provide the second factor of two-step authentication. This approach protects your Stanford account from fraudulent access. Then you need a physical device such as your mobile phone, tablet, or landline phone to complete the login. First, you enter your SUNet ID and password. Two-step authentication uses two forms of authentication to verify your identity. Risk Classifications: Approved Services.Watch Information Security Awareness Video.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |