Difference between revisions of "Multi-factor authentication for Office 365"

From WSU Technology Knowledge Base
Jump to navigation Jump to search
(13 intermediate revisions by 3 users not shown)
Line 1: Line 1:
__notoc__
+
[[File:O365_mfa.png ‎|right]]
[[File:O365_mfa.png ‎|right|200px]]
+
{{TOC_Float_Right}}
 
==About this article==
 
==About this article==
 
This article includes the steps involved in configuring multi-factor authentication (MFA) for Microsoft Office 365. It is intended for all WSU students, faculty, and staff.  
 
This article includes the steps involved in configuring multi-factor authentication (MFA) for Microsoft Office 365. It is intended for all WSU students, faculty, and staff.  
 
==What's Office 365 Multi-Factor Authentication (MFA)?==
 
==What's Office 365 Multi-Factor Authentication (MFA)?==
In order to better protect you, your data, and our campus network from increasingly sophisticated phishing and other social engineering attacks, Winona State University will be implementing an Office 365 (O365) security feature this fall called Multi Factor Authentication (MFA). Once enabled, your password alone (which someone could have stolen from you) will not be enough to prove your true identity when you log into O365. In addition to your username and password, O365 will ask for more proof before it lets you in the door. Think of it as a special knock or a secret handshake. O365 will not request your special handshake every time you log in from your office or other "trusted" computers, only when it detects something has changed or your account is being used someplace new.
+
In order to better protect you, your data, and our campus network from security threats, Winona State University will soon implement  Multi Factor Authentication (MFA) for Office 365. Once enabled, you must also use the another verification method along with your user name and password. This adds another layer of security and significantly reduces security threats.
 
 
 
===MFA Options===
 
===MFA Options===
  
You can choose from several MFA options and can use different options in different situations, depending on what's most convenient for you. The type of handshake or knock you choose can have an impact on how and where your account can be used, so we want you to be well-informed before you decide what is best for you.
+
There are a variety of authentication options that can be chosen for Office 365 ranging from a verification phone call to a secret code generated by an app on your phone. Below are all of the supported options.
  
 
====Option 1: Smartphone Notification App====
 
====Option 1: Smartphone Notification App====
  
This is generally the easiest option for people who have a smartphone and is presented as '''"Notify me through app"'''. When the system needs additional assurance to verify your password was really entered by you, a popup is seen on your phone that asks you "Do you approve this login Y/N" All you need to do is press Y or N to confirm you expected that login and the rest is automatic. This application is easy to configure, easy to monitor and consumes very little data and battery. The upside of this option is that it makes your O365 account accessible to you wherever you bring your smartphone. If you need to access your account on your home computer, press Y on your phone. If you need to access your account from a hotel lobby kiosk, press Y on your phone. The only downside to this option is that not everyone has a smartphone or is willing to use their smartphone for anything work-related. This is why there are other options.
+
This is the easiest option if you own a smartphone. After you download and configure the '''Microsoft Authenticator''', your phone will prompt you before every login to approve the login request. After you select '''approve''' on your phone your will be logged in.  
 +
 
 +
This method isn't for every one as users without smartphones will not be able to use this method, and if you lose your smartphone, you may temporarily lose access to your Office 365 until you go through the recovery process.  
  
 
====Option 2: Cell Phone Text====
 
====Option 2: Cell Phone Text====
This is the next easiest way for people who either don't have a smartphone or don't want the overhead of the application to verify their identify when the need arises. The '''"text a code to my phone"''' option will simply text you a seemingly random 6-digit number that you will be prompted to enter after your password. When you enter the correct numbers it sent, the system is relatively certain it is you and not a hacker with a stolen password and will let you in. This option is again very easy to set up, requires very little configuration, and relies on only basic texting service. While it isn't quite as easy as the notification app, it does provide people with the ability to access their account while not at work or on a work laptop, which can be important to some people. While not required, leveraging a personal cellular device does provide you the most flexibility in accessing your work account when not at work.
+
 
 +
The next option is text verification. After you type in your credentials to your account, it will ask permission to send a text message to your phone. After you clock '''Send me the text''', you will receive a 6 digit code via text on your cell phone. Next you must enter this code into the field now located on the login window of your computer and you are now successfully logged into your account.  
 +
 
 +
This is a great method for those without smartphones. This method is always nice because as long as your cell phone number stays the same, this method will work. This means that no extra configuration is required when you upgrade or replace your cell phone.
  
 
====Option 3: Smartphone Code Generating App====
 
====Option 3: Smartphone Code Generating App====
Similar to the 6-digit codes sent via text to your cell phone, the code generator app is a way to verify your identity, but without the data requirements of Option 1 or even the cellular text requirement of Option 2. It will work in the basement of a fallout shelter. Though not as easy as pressing Y or N, it does provide users a good option if they are frequently in a location where cellular service is poor, but they have Internet access through a different provider.
 
  
====Option 4: Call My Personal Phone====
+
The '''Microsoft Authenicator''', along with being used for option 1, can also be used for another form of authentication. This method will constantly be generating a 6 digit code every 30 seconds right on the app, that you will simply enter in office 365 after you enter your credentials.
This option is for anyone who wants to be able to access their O365 account from off-campus but doesn't have a smartphone or cell phone capable of receiving a text. This option works on any home phone or basic cell phone. When the system doesn't recognize you logging in, you will receive a phone call with an automated voice asking you to approve this logon attempt. If you weren't expecting this call you would obviously not approve it, but if you had just typed your password into your home computer you would press a number to finish the logon process. This isn't an ideal option for most people because it is much slower and less mobile that the others, but it can be very helpful in a pinch.
+
 
 +
This method '''does not require any data''' which means even if your are our of country with no cellular data or WiFi you can still access to your account.
 +
 
 +
====Option 4: Call My Phone====
 +
 
 +
This option allows you to verify via a phone call. Whenever you login, you will get an automated phone call asking you to approve the login. This method can be used with either a personal phone or an office phone, and just as in option 2, no extra configuration will be necessarily upon upgrading or replacing a phone so long as your phone number stays the same.  
  
====Option 5: Call My Office Phone====
+
It is important to note that using an Office Phone as your only other verification method will disallow you from accessing your account when you do not have access to this phone.  
Just like Option 4, O365 has your university office phone number pre-populated and can call you to confirm your logon. If you forgot your cell phone at home, or dropped it in the river over the weekend, this option is a fail-safe that will allow you to get logged in when you return on Monday morning. Again, this option can be cumbersome and will not facilitate access on a home computer or anywhere that isn't within arm's reach of your work desk phone, but it does ensure that you can get your work done on your work computer when you are at work.
 
  
 
====Option 6: University Laptop or Tablet Code Generating App====
 
====Option 6: University Laptop or Tablet Code Generating App====
Exactly like Option 3, it is possible to install a code generator application on a university laptop or tablet that will function as extra "proof" it is you when you log in. This option may look appealing; however we don't feel it will be overly helpful for most people. After all, if you have your university laptop at home, why check your mail on your home computer? It will already be working on your laptop! However, there may be a few specific use cases for this option. Perhaps someone doesn't have a cell phone or a home phone and still really needs to use a home computer? If you are interested in this option, contact the {{TSC}}.
+
It is possible to install a code generator application on a university laptop or tablet. This will function exactly like option 3 and the '''Microsoft Authenticator'''. If you would like to setup this option, please contact {{TSC}} for more info.
 +
 
 +
====Multi-Option====
 +
All of the authentication options are better in certain situations and not so good in others. For example if you are traveling abroad and do not have access to WiFi or Cellular, the first option will not work for you. This is why we recommend setting up multiple authentication options so that no matter what situation you find yourself in, you are still able to access your Office 365 account.
  
 
==Setup Trust Account==
 
==Setup Trust Account==
Line 65: Line 75:
 
*Type in your StarID password once and click approve (or enter text option)
 
*Type in your StarID password once and click approve (or enter text option)
  
[[Category:Microsoft Office 365]]
+
==More Info==
 +
 
 +
[https://thenextweb.com/google/2019/05/23/google-data-shows-2-factor-authentication-blocks-100-of-automated-bot-hacks/ Google data shows 2-factor authentication blocks 100% of automated bot hacks - The Next Web]
 +
 
 +
[https://heimdalsecurity.com/blog/start-using-two-factor-authentication/ Why You Should Start Using Two-Factor Authentication Now - Heimdal Security]
 +
 
 +
[https://www.wired.com/story/two-factor-authentication-apps-authy-google-authenticator/ How to Secure Your Accounts with Better Two-Factor Authentication - Wired.com]
 +
 
 +
[[Category:Security]][[Category:Microsoft Office 365]][[Category:MFA]][[Category:2FA]][[Category:Multi-Factor Authentication]]

Revision as of 15:02, 16 July 2019

O365 mfa.png

About this article

This article includes the steps involved in configuring multi-factor authentication (MFA) for Microsoft Office 365. It is intended for all WSU students, faculty, and staff.

What's Office 365 Multi-Factor Authentication (MFA)?

In order to better protect you, your data, and our campus network from security threats, Winona State University will soon implement Multi Factor Authentication (MFA) for Office 365. Once enabled, you must also use the another verification method along with your user name and password. This adds another layer of security and significantly reduces security threats.

MFA Options

There are a variety of authentication options that can be chosen for Office 365 ranging from a verification phone call to a secret code generated by an app on your phone. Below are all of the supported options.

Option 1: Smartphone Notification App

This is the easiest option if you own a smartphone. After you download and configure the Microsoft Authenticator, your phone will prompt you before every login to approve the login request. After you select approve on your phone your will be logged in.

This method isn't for every one as users without smartphones will not be able to use this method, and if you lose your smartphone, you may temporarily lose access to your Office 365 until you go through the recovery process.

Option 2: Cell Phone Text

The next option is text verification. After you type in your credentials to your account, it will ask permission to send a text message to your phone. After you clock Send me the text, you will receive a 6 digit code via text on your cell phone. Next you must enter this code into the field now located on the login window of your computer and you are now successfully logged into your account.

This is a great method for those without smartphones. This method is always nice because as long as your cell phone number stays the same, this method will work. This means that no extra configuration is required when you upgrade or replace your cell phone.

Option 3: Smartphone Code Generating App

The Microsoft Authenicator, along with being used for option 1, can also be used for another form of authentication. This method will constantly be generating a 6 digit code every 30 seconds right on the app, that you will simply enter in office 365 after you enter your credentials.

This method does not require any data which means even if your are our of country with no cellular data or WiFi you can still access to your account.

Option 4: Call My Phone

This option allows you to verify via a phone call. Whenever you login, you will get an automated phone call asking you to approve the login. This method can be used with either a personal phone or an office phone, and just as in option 2, no extra configuration will be necessarily upon upgrading or replacing a phone so long as your phone number stays the same.

It is important to note that using an Office Phone as your only other verification method will disallow you from accessing your account when you do not have access to this phone.

Option 6: University Laptop or Tablet Code Generating App

It is possible to install a code generator application on a university laptop or tablet. This will function exactly like option 3 and the Microsoft Authenticator. If you would like to setup this option, please contact Technical Support Center (TechSupport@winona.edu, 507-457-5240, Somsen Hall 207) for more info.

Multi-Option

All of the authentication options are better in certain situations and not so good in others. For example if you are traveling abroad and do not have access to WiFi or Cellular, the first option will not work for you. This is why we recommend setting up multiple authentication options so that no matter what situation you find yourself in, you are still able to access your Office 365 account.

Setup Trust Account

If you see other choices you may have set something up previously. Office 365 personal or security and privacy settings contain some of this info so it may have been added previously.

1. Go to https://account.activedirectory.windowsazure.com/Proofup.aspx

2. Sign into your account and setup MFA

Our Recommendations

  • Provided you have a smart phone, we highly recommend using the Notify Me through app using the Microsoft Authenticator app as your #1 choice; followed by a backup text.  This notification process makes it super easy when your account is finally tripped.
  • A regular cell phone without smart capabilities use text
  • If no cell phone your options are to use your office phone or use verification code from app on a university laptop.

Setup Process

VerificationScreenPreferred1.png

  • Click on Setup
  • On the next screen read through the instructions, install the app and click on Next

ConfigureMobileApp1.png


  • A message will be sent to you phone

AdditionalSecurity5.png


  • When you get the verification message click on Approve

AndroidApproved1.jpg

Activation

  • Activation consists of scheduling your account to have Multifactor
  • You will get a popup - Within an hour you will need to validate your account
  • Type in your StarID password once and click approve (or enter text option)

More Info

Google data shows 2-factor authentication blocks 100% of automated bot hacks - The Next Web

Why You Should Start Using Two-Factor Authentication Now - Heimdal Security

How to Secure Your Accounts with Better Two-Factor Authentication - Wired.com