...
Multi-Factor Authentication (MFA) requires more than one factor to authenticate. Most commonly, MFA requires typing a password (first factor) and entering a one-time code (second factor) generated by a device, such as Google Authenticator on your phone. With MFA, an attacker will not be able access your account simply by knowing your password. The attacker must also have the device capable of generating a code, a much more difficult task.
Most people already use MFA at Berkeley Lab and/or to secure their personal accounts.
How to use MFA at Berkeley Lab?
When using MFA at Berkeley Lab, after entering your username and password you will be prompted for a one-time code, as follows:
Most people already use MFA at Berkeley Lab and/or to secure their personal accounts.
If you are a member of an Operations division, MFA was required to login Berkeley Lab enterprise applications (Gmail, LETS, FMS, etc.) in May 2018
...
- How do I opt-in to MFA?
- How can I manage my Google Authenticator MFA tokens?
- How do I manage my Yubikey MFA tokens? (Operations Only)
- I lost my MFA token and can't login?
Other MFA resources
- Multi-Factor Authentication MFA for FMS and HRIS - MFA users, both required and opt-in, must use MFA to authenticate to FMS and HRIS.
- Multi-Factor Authentication MFA for Windows workstations Workstations (Operations Divisions only) - Operations users logging into Windows Active Directory computers must use MFA.
- Multi-Factor Authentication MFA for Privileged Accounts (IT Division only) - Privileged accounts used for IT infrastructure management must use MFA
- Lawrencium HPC Cluster - MFA for HPCS Clusters
...