The Microsoft Authenticator app helps you sign-in to your accounts if you use two-factor authentication (2FA). Two-factor verification helps you access your accounts more securely. No more getting a phone call, or receiving a text code to sign-in! Another great thing, you don't need an internet connection to use (after the initial setup). Available for download from:
Question: Which version of the Authenticator app should I be using?
Answer: We're always working on new features, bug fixes, and performance improvements. Make sure you stay updated with the latest Android and iOS version for the best authentication experience.
Multi-factor authentication (MFA) and two-factor authentication (2FA) are security processes that require individuals to provide two or more authentication factors before granting access to an account or system. These authentication factors typically fall into three categories:
Whether you're planning to travel or not, EKU STRONGLY URGES you to enroll at least two devices, in case your preferred device is lost, stolen, disabled, or inaccessible.
Numerous attacks on institutions of higher education have resulted in the theft, alteration, or destruction of data. EKU has been targeted by cybercriminals with similar capabilities.
Use the Microsoft Authenticator app. After installation, the app will work even without internet access (if you use its one-time codes for authentication.
Use the Outlook mail app on your smart phone instead of the pre-installed email app for a better overall experience.
Although the two-factor/multi-factor authentication process is designed to be as quick and painless as possible, you may find yourself wondering "is this really necessary?" or "Why does it apply to me?" if that's the case, read on to learn why.
The column headings in the following table are the types of devices that can be used for multifactor authentication. The row labels list authentication methods. Together, they should which methods of authentication are available for each device.
Explanations of an authentication method is briefly explained below the table.