Viewable by the world

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 93 Next »

What is Multi-Factor Authentication? 

Single factor authentication, such as typing a password, is increasingly an insufficient protection for online accounts. The combination of phishing, malware, and brute-force guessing present a formidable threat to single factor authentication.  Unauthorized access to your account can have significant harm, both to you personally (financial harm for example) and to the mission and reputation of Berkeley Lab.  

Multi-Factor Authentication (MFA) requires more than one factor to authenticate.  Most commonly, MFA requires typing a password (first factor) and entering a one-time code (second factor) generated by a device, such as Google Authenticator on your phone.   With MFA, an attacker will not be able access your account simply by stealing your password.  The attacker must also steal device capable of generating a code, a much more difficult task from afar. 

How to use MFA at Berkeley Lab?

MFA at Berkeley Lab enables you to have a second factor protecting your Lab account. When you login into enterprise applications (behind the Shibboleth Single Sign-On), you will first be prompted for username and password then prompted for a one-time code.

     

Most people already use MFA at Berkeley Lab and/or to secure their personal accounts. It is highly effective at preventing unauthorized access to your accounts. 

MFA Frequently Asked Questions (FAQ) 

Operations Divisions

Since May 2018, MFA has been required for Operations users logging into Berkeley Lab enterprise applications (Gmail, LETS, FMS, etc.)

Scientific Divisions

Beginning September 2018, Scientific division users can opt-in to use MFA for Berkeley Lab enterprise applications.

Other MFA resources


If you have questions regarding MFA, please submit a help ticket or contact the IT Help Desk at 4357. 





  • No labels