Viewable by the world

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

What is multi-factor authentication? 

Multi-factor authentication is method where a user is granted access to a resource once they have provided several separate pieces of evidence proving who they are. For example, think about accessing your bank accounts via an ATM machine. To prove to the bank who you are and that you can have access to your bank account, you insert your ATM card (something you have) and enter your PIN number (something you know). You have provided the bank with two forms of authentication enabling the bank to give you access to your accounts.

Why use multi-factor authentication? 

Plain and simple, to secure resources against unauthorized personnel.

Security Tokens at Berkeley Lab

A methodology to implement multi-factor authentication requires the use of one-time passwords (OTP) or what we call security tokens. OTP can be provided either by software or hardware solutions. Berkeley Lab IT has opted from both methods.  Software security tokens are generated from Google Authenticator and the issuance of hardware tokens with varying security privileges can be obtained from Berkeley Lab IT.

Multi-factor Authentication at Berkeley Lab

IT at Berkeley Lab has initiated multi-factor authenticaion in a few implementations this last year. They are:

  • StrongID - requirement of multi-factor authentication for Operations personnel logging into Windows Active Directory
  • HRIS OTP - requirement of multi-factor authentication to Berkeley Lab HR data
  • Sibboleth OTP - requirement of multi-factor authentication for Shibboleth providing access to Berkeley Lab data resources like email, calendar, LETS, etc.

How do I get started using Multi-factor Authentication?

Berkeley Lab employees must submit a help ticket to obtain any hardware security OTP tokens. The full process is outlined here.

  • No labels