{"id":10080,"date":"2015-12-11T14:06:38","date_gmt":"2015-12-11T19:06:38","guid":{"rendered":"http:\/\/scholarblogs.emory.edu\/lits\/?p=10080"},"modified":"2016-03-30T11:38:41","modified_gmt":"2016-03-30T15:38:41","slug":"duo-two-factor-authentication-is-coming","status":"publish","type":"post","link":"https:\/\/scholarblogs.emory.edu\/lits\/2015\/12\/11\/duo-two-factor-authentication-is-coming\/","title":{"rendered":"Duo Two-Factor Authentication is Coming"},"content":{"rendered":"<figure id=\"attachment_10108\" aria-describedby=\"caption-attachment-10108\" style=\"width: 360px\" class=\"wp-caption alignright\"><a href=\"https:\/\/scholarblogs.emory.edu\/lits\/files\/2015\/12\/duo_process.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10108\" src=\"https:\/\/scholarblogs.emory.edu\/lits\/files\/2015\/12\/duo_process.png\" alt=\"Illustration of two factor authentication\" width=\"360\" height=\"202\" \/><\/a><figcaption id=\"caption-attachment-10108\" class=\"wp-caption-text\">Duo two-factor authentication.<\/figcaption><\/figure>\n<p>With increasingly sophisticated cyber attacks targeting higher education and healthcare institutions, passwords alone\u00a0are no longer\u00a0a sufficient way to protect resources. Two-factor authentication decreases the risk of compromises and data breaches by making a username and password alone insufficient for accessing sensitive resources.<\/p>\n<p>Two-factor authentication is something that you have, like a mobile device, as well as something you know, such as your password. You are probably using two-factor authentication already without knowing it. If you\u2019ve ever had your bank text you a code to enter on their website before logging in, you\u2019ve used two-factor authentication.<\/p>\n<p>Duo two-factor authentication is a smartphone app that will prompt you to confirm your login request when you login with your NetID and password to one of the Duo-protected systems mentioned below. Simply confirm the request, and you\u2019ll be logged in. Alternatively, you can enter a code sent to you via text message, or receive a phone call on your cell phone or landline.<\/p>\n<p>In the coming months, Emory will be enabling\u00a0two-factor authentication, provided by Duo Security, across a number of sensitive systems. These include: Outlook Web Access (e-mail), PeopleSoft HR, OPUS, Compass, VPN, Healthcare VDT, and others. You will only be required to use Duo when you connect to these services from an off-campus location (such as your home, a hotel, a coffee shop,\u00a0etc.). Along with all of Emory&#8217;s campuses and Healthcare locations,\u00a0Children\u2019s Healthcare of Atlanta and Grady Hospital will be considered on-campus because of the number of Emory staff that work in those locations.<\/p>\n<p>Be on the lookout soon for more detailed communications about Emory\u2019s implementation of Duo two-factor authentication, along with instructions for enrolling in the service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With increasingly sophisticated cyber attacks targeting higher education and healthcare institutions, passwords alone\u00a0are no longer\u00a0a sufficient way to protect resources. Two-factor authentication decreases the risk of compromises and data breaches by making a username and password alone insufficient for accessing sensitive resources. Two-factor authentication is something that you have, like a mobile device, as well [&hellip;]<\/p>\n","protected":false},"author":2981,"featured_media":10108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[308,18,396],"class_list":["post-10080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-project-updates","tag-enterprise-security","tag-information-security","tag-two-factor-authentication"],"_links":{"self":[{"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/posts\/10080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/users\/2981"}],"replies":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/comments?post=10080"}],"version-history":[{"count":8,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/posts\/10080\/revisions"}],"predecessor-version":[{"id":10115,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/posts\/10080\/revisions\/10115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/media\/10108"}],"wp:attachment":[{"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/media?parent=10080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/categories?post=10080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/lits\/wp-json\/wp\/v2\/tags?post=10080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}