Top Banner
2Factor Authentication 2Factor Authentication Replace image with a 3C image
23
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

2Factor Authentication

Replace image with a 3C image

Page 2: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationCommunications Plan

2Factor Authentication 2

1. Focus group of cross-campus users2. UC Creative for design work3. Outreach presentations to various groups 4. Postcard mailing to staff in summer, to faculty in fall5. Bulk Email6. Posters around campus7. Techb@r training events8. Internal/technical documentation9. ITS Support Desk training10. ITS website, social media, newsletters11. Brochure on safe computing that includes 2FA12. Knowledge Base articles links from 2FA

Page 3: 2Factor Authentication Replace image with a 3C image.

FOCUS GROUPQuiz on password strength/usage

Two-Step Authentication

Yeah, you can still stumble around...and no one can say you don't have singleminded focus, but when you don't use your brain, you end up having to eat them. The good news is, you really can't go anywhere but up. Just changing your password will move you into the land of the living---"Aaarr!Rrrrrr!" should work just fine!

Zombie!

Page 4: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationFocus Group – Quiz Score

2Factor Authentication 4

Fuzzy K itt enYou are the softest little furball out there with the pinkest toe pads and a purr so sweet it causes toothaches. The electricity spent streaming videos of you chasing your tail and discovering wet food could fuel a small country. The problem is, when everyone knows you, everyone really wants to know you! You may not even recognize the big electronic target on your forehead what with all the sweet grooming sessions and adorable naps with the dog.

Spend a moment or two considering where your information is distributed and make sure that the only thing you distribute is your own floofy brand of twee.

Achi l lesYou are the greatest of the Greek heroes; the subject of epic poetry, demigod, and played by Brad Pitt. Obviously, there's a lot going right for you.

Buuut . . . there is that tricky heel issue. Don't let the fact that you created a password strong enough for the ages prevent you from doing the right thing and changing it regularly.

Page 5: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationRollout

2Factor Authentication 5

1. Test scripts – internal testing2. Pilot program – early adopters3. Soft rollout this summer4. Summer announcements – staff rollout5. Fall announcements – faculty rollout6. Adjustments and enhancements

Page 6: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationPostcard

2Factor Authentication 6

Page 7: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationPoster

2Factor Authentication 7

Page 8: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationSample Outreach

PowerPoint

2Factor Authentication 8

Here are some slides from an earlier introduction....

Page 9: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

2Factor Authentication

https://www.duosecurity.com/why-two-factor

Page 10: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

10

2Factor Authentication enhances the security of your account by using a device (such as your phone) to verify your identity. This prevents anyone but you from accessing your account, even if they know your password.

We are using “Duo Security” software for our authentication.

The “duo” factors are:1. Your CNetID (no changes to this use)2. A verification sent to your device

(smartphone, landline, tablet, other alternatives)

Page 11: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

11

Why Do I Need This?Passwords are becoming increasingly easy to compromise. They can be stolen, guessed, and hacked — you might not even know who else has your password and is accessing your account.

Two-factor authentication adds a second layer of security to your account to make sure that your account stays safe, even if someone else knows your password. And you'll be alerted right away (on your phone) if someone does know your password and tries to log in with it.

Page 12: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

12

Will 2FA affect all the applications that I can access?

2FA is only for University of Chicago sites that use Shibboleth authentication. There are two ways you can interact with 2FA. 1. You can opt-in so that you will need to authenticate

using 2FA on all University sites with Shibboleth.

2. You can register a device so that you will be ready in case any University sites elect to require 2FA.

Page 13: 2Factor Authentication Replace image with a 3C image.

2Factor Support

2Factor Authentication 13

ITS Support will be available by the usual methods .…

Page 14: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationInitial Screen

14

Page 15: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationOpt In

15

Page 16: 2Factor Authentication Replace image with a 3C image.

2Factor AuthenticationOnline Support link from

2FA

2Factor Authentication 16

What are commonly visited UC sites using Shibboleth?

# Description Site1 ESS - Employee Self-Serve ess.uchicago.edu/ess2 Remote access to Library databases (proxy) login.proxy.uchicago.edu/ezproxy 3 My Chicago University portal my.uchicago.edu 4 UChicago Google Applications Service (including gMail) google.com 5 cAlert - emergency notification system calert.uchicago.edu 6 Vendor Management Database for procurement non-po.uchicago.edu7 Institutional Review Board Management System aurairb.uchicago.edu 8 Grants Management System auragrants-prod.uchicago.edu 9 Inter-Library Loan requests.lib.uchicago.edu

10 CNetID site for Trusted Agent management cnet.uchicago.edu 11 JSTOR academic publisher www.jstor.org 12 UChicago's Service-Now Issue Management System uchicago.service-now.com 13 Personalized use of Library catalog libcat.uchicago.edu 14 Instructor's course management facultyaccess.uchicago.edu 15 Detailed information about classes classes.uchicago.edu 16 Career Advancement service careeradvancement.uchicago.edu

Page 17: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

2Factor Authentication 17

When you select the recommended Duo Push, this is what Duo looks like on your phone …

Page 18: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

2Factor Authentication 18

Then you will proceed to the site you originally requested.

With Protection!

Page 19: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

2Factor Authentication 19

Yikes! I’m NOT signing in!!• Click “Deny”

• Click to report it as fraudulent, or oops – my mistake & re-try.

• Fraudulent? Email will be sent to our Duo Administrator & tracked on the 2FA log

Page 20: 2Factor Authentication Replace image with a 3C image.

2Factor Alternatives

2Factor Authentication

Alternative to a smartphone:1. Register your office and home phones – as

many phones as you may use. You will receive an automated voice message with a passcode to use.

2. Register your Tablet. You will receive the Approve/Deny prompt.

3. Tokens – departments will be able to order from the Identity & Privileges Office in Regenstein for a nominal fee.

20

Page 21: 2Factor Authentication Replace image with a 3C image.

2Factor Alternatives

2Factor Authentication

How do I use the token?• Just press a button on the token to view a

passcode• Key in that passcode on the login prompt

21

Page 22: 2Factor Authentication Replace image with a 3C image.

2Factor Summary

2Factor Authentication 22

• 2Factor Authentication helps secure University data• The University has been the target of phishing schemes.

• Various device options are available• Register smartphones, landlines, tablets, or tokens

• Support• Contact [email protected] or visit the TECHB@R

Page 23: 2Factor Authentication Replace image with a 3C image.

2Factor Authentication

2Factor Authentication 23

Questions?