This site requires JavaScript to be enabled
An updated version of this article is available
Knowledge Base: Public
Category: Information Security / Duo (Multi-Factor Authentication)
35710 views

40.0 - Last modified on 2025-04-29 Revised by Tobi Paton

39.0 - Last modified on 2025-02-25 Revised by Noah Chang

38.0 - Last modified on 2025-02-25 Revised by Tobi Paton

37.0 - Last modified on 2025-02-25 Revised by Walter Allen

36.0 - Last modified on 2025-02-25 Revised by Walter Allen

35.0 - Last modified on 2025-02-13 Revised by Walter Allen

34.0 - Last modified on 2025-02-13 Revised by Walter Allen

33.0 - Last modified on 2025-02-13 Revised by Stephanie Holmes

32.0 - Last modified on 2025-02-13 Revised by Stephanie Holmes

31.0 - Last modified on 2025-02-12 Revised by Noah Chang

30.0 - Last modified on 2025-02-11 Revised by Tobi Paton

29.0 - Last modified on 2025-02-11 Revised by Iris Chelaru

28.0 - Last modified on 2025-02-09 Revised by Iris Chelaru

27.0 - Last modified on 2025-02-07 Revised by Tobi Paton

26.0 - Last modified on 2025-02-07 Revised by Noah Chang

25.0 - Last modified on 2025-02-07 Revised by Tobi Paton

24.0 - Last modified on 2025-02-07 Revised by Tobi Paton

23.0 - Last modified on 2025-02-07 Revised by Noah Chang

22.0 - Last modified on 2025-02-06 Revised by Edgar Nunez

21.0 - Last modified on 2025-02-06 Revised by Walter Allen

20.0 - Last modified on 2025-02-06 Revised by Edgar Nunez

19.0 - Last modified on 2025-02-06 Revised by Noah Chang

18.0 - Last modified on 2025-02-05 Revised by Noah Chang

17.0 - Last modified on 2025-02-05 Revised by Tobi Paton

16.0 - Last modified on 2025-02-05 Revised by Tobi Paton

15.0 - Last modified on 2025-02-05 Revised by Tobi Paton

14.0 - Last modified on 2025-02-05 Revised by Walter Allen

13.0 - Last modified on 2025-02-04 Revised by Edgar Nunez

12.0 - Last modified on 2025-02-04 Revised by Walter Allen

11.0 - Last modified on 2025-02-03 Revised by Walter Allen

10.0 - Last modified on 2025-02-03 Revised by Walter Allen

9.0 - Last modified on 2025-02-03 Revised by Walter Allen

8.0 - Last modified on 2024-10-11 Revised by Stephanie Holmes

7.0 - Last modified on 2024-08-06 Revised by Stephanie Holmes

6.0 - Last modified on 2024-04-03 Revised by Tobi Paton

5.0 - Last modified on 2024-02-21 Revised by Tobi Paton

4.0 - Last modified on 2024-02-21 Revised by Tobi Paton

3.0 - Last modified on 2024-02-21 Revised by Tobi Paton

2.0 - Last modified on 2023-11-16 Revised by Logan Hill

1.0 - Created on 2018-06-29 Authored by IET

* Recent Announcement * 

Switch to the Duo Mobile app: Texts & callbacks to be discontinued 2/15

As text messages and phone callbacks will no longer be available for Duo after February 15, we understand the need for information on additional options, such as hard tokens, especially for those who may not have access to a smartphone or have other accessibility needs. 

About hard tokens

We are working on providing an update on hard tokens as a priority. The Information Security Office is testing several options, and our support teams are working on the process to properly configure and support them.

 

Access to Hard Token

Students:

Staff: