The types of credentials typically fall into three categories - something you know, such as a PIN or password, something you have, such as a one-time passcode generator, token or smart card, and something you are, such as a fingerprint or other biometrics.Īuthentication methods used to access high risk data, as defined in the UW – Whitewater Authentication Policy, the UW - Whitewater Instructional, Communication, Information Technology (ICIT) Information Asset Classification Policy and the University of Wisconsin System Administrative Policy 1031 - Information Security: Data Classification, must use multi-factor authentication. This process reduces the risk of impersonation or the use of compromised credentials by an unauthorized individual. Multi-Factor Authentication (MFA) is achieved when multiple forms of authentication are used to increase the likelihood that the credentials are from the individual to whom they were assigned. The rule on top has the highest priority.Multi-Factor Authentication Policy and Procedures If you have more than one authentication rule, you can prioritize them by dragging them. (Optional) If you have more than one authentication rule, you can drag and drop the rules to a new position in the list to control the order they are applied.Note: If you have no authentication rules configured and you select Not Allowed in the Default Profile drop-down, users will not be able to log in to the service. (Optional) In the Default Profile (used if no conditions matched) drop-down, you can select a default profile to be applied if a user does not match any of the configured conditions.If you have not created the necessary authentication profile, select the Add New Profile option. The authentication profile is where you define the authentication methods. Select the profile you want applied if all filters/conditions are met in the Authentication Profile drop-down.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |