Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info

To use two-factor authentication, a User must have the following ready:

  • an authenticating device: this is usually a personal device the User has access to during the login process, e.g., their smartphone, 
  • an authenticator app installed on their authenticating device.

There are a number of third party Authenticator apps available and free that Users can easily download to their personal devices. Some popular ones are Authy, Microsoft Authenticator, and Google Authenticator. NOTE - The authenticating procedure may vary slightly for different apps but they all involve the scanning of a QR Code or manually entering an entry key, and then obtaining the authentication PIN for login.  

...

Note
titleDisabling forced authentication

Administrators can disable forced authentication for a User by toggling OFF Override Forced Global Two Factor State and User Specific Override and saving the change. However, if the User has set up a current authentication, the system will not permit disabling of the feature until the authentication has been cleared (CMS User Login (Two-factor authentication)).  

...