Skip to end of banner
Go to start of banner

Multi-Factor Authentication (MFA) Management

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Please visit Microsoft's My Security Info to manage your MFA authentication methods and default method.

Adding MFA methods

Just One Is Never Enough!

Please configure multiple MFA methods so that losing one does not prevent you from accessing your Geneseo account!

Common ways to lose access to MFA methods are:

  1. Getting a new phone - the Microsoft Authenticator app does not support transfer or backup/restore.

  2. Traveling abroad to a place where your US phone number cannot receive SMS or calls.

  1. Access your Microsoft security info, or sign into my.geneseo.edu, click on your initials in the upper right corner, and select "Manage Security Info" 

  2. To Add a method, click + Add method. If you do not have any methods, you will be automatically prompted to create your first one.

  3. Select the type of method you want to add.

  4. Follow the prompts for the selected method. See the Available Methods section below for specific instructions.

Remove an MFA Method

  1. Access your Microsoft security info

  2. Find the method you want to remove in the list and click the delete option

Change your default MFA method

  1. Access your Microsoft security info

  2. Click Change

  3. Select the method you would like to use from the drop down menu

Available Methods

Microsoft Authenticator App

The free Microsoft Authenticator app (available for iOS and Android devices) is our recommended authentication method, and sends a "push" notification to your device to verify your login attempt. It also provides a rotating code you can type in if your mobile device doesn't have internet connectivity and can't receive push notifications.

Please see Microsoft's official Authenticator App method documentation for instructions on adding this method to your account.

Unexpected Notifcations?

If you receive a notification when you are not attempting to log in, deny the request and use the 'report as fraud' function within the app.

Don't get locked out!

Deleting Microsoft Authenticator or transferring it to a new phone will break the trust between Microsoft and your device, and you'll need to use one of your other configured MFA methods to reestablish that trust. If have no other MFA methods configured and cannot sign in to your account, please call the CIT HelpDesk at 585-245-5588. They will verify your identity over the phone, and walk you through reestablishing a working MFA method.

"Other" Authenticator Apps

Any app that supports scanning MFA QR codes (ie. implements the Time-based One Time Password, or TOTP, protocol) may be used with your Geneseo account. The following are popular choices:

Add one of these apps by going to your Security Info page, then:

  1. Click the add sign-in method

  2. Select authenticator app and click Add

  3. Click I want to use a different authenticator app

  4. Click next

  5. Follow the instructions from your other authenticator app for reading the QR code. Once your app displays a 6-digit code for this new account, click next

  6. Enter the 6-digit code displayed in your other authenticator app when prompted by Microsoft, and click next. This confirms to Microsoft that your other authenticator app correctly parsed the secret information in the QR code.

Phone Verification

For US phone numbers, located in the US only, Microsoft will call your phone number and prompt you to approve your pending sign-in.

Please see Microsoft's official Phone method documentation for instructions on adding this method to your account.

Text (SMS) Message

For US phone numbers, located in the US only, Microsoft will send a text (SMS) message with a code to be entered in the login window.

Please see Microsoft's official SMS method documentation for instructions on adding this method to your account.

Security Key

Any FIDO2-compatible physical security key can be registered and used with Geneseo accounts. See Microsoft 365 Passwordless Authentication for more details.

Security Fob

If you do not have access to a mobile or desk phone, your department can purchase a security fob. The security fobs are small (about the size of a car key fob). Press the button on the fob to generate a number that can be typed in to the authentication screen to confirm your login. *Please note—hardware tokens must be purchased from CIT for $16. Third-party hardware tokens are not supported.

Troubleshooting and Questions

 Why are we requiring people to use MFA?

We are required to use MFA by new SUNY security guidelines. Our systems are under constant attack. The most common are password spray attacks, where attackers send thousands of logins using usernames and passwords harvested from the web, and phishing attacks, where attackers attempt to get your username and password. Multi-factor Authentication stops all these attacks. 

Suppose you would like a detailed analysis of how MFA protects logins. In that case, Your Pa$$word Doesn't Matter lays out Microsoft's research across millions of logins, explaining why passwords are insecure and how MFA results in protecting against all but the most targeted attacks.

 What logins will require MFA?

Logins to most Geneseo web-based services and Microsoft's OneDrive and Office require you to sign in and use MFA at least every 14 days. Sign-in frequency varies between services based on security and vendor requirements.

 What if I forgot my primary authentication device?

When prompted to sign in, click on the Sign in another way button and select a new method.

 What if I lose my phone or authenticator app?

You should notify the CIT HelpDesk immediately if you lose your phone or authenticator.

 Should I take any precautions regarding the security of my MFA-enrolled smartphone or tablet?

Yes. Using a device for multi-factor login comes with the obligation to take reasonable precautions to protect it. Such precautions normally include using a password or a PIN to unlock the phone and maintaining current versions of your device's operating system and Authenticator App.

 Can I use a different authenticator app (like Google Authenticator)?

Yes. Third-party apps such as 1Password, Authy, or Google Authenticator can be used as a software token to generate an OATH verification code. Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time.

 What if I get an authentication notification that I didn't expect?

You should report all messages that you did not generate. This may be a sign of someone attempting unauthorized access to your account, and your password may be compromised. Deny the notification and then confirm that it’s a fraudulent attempt. You should change your Geneseo password after reporting the fraudulent login attempt. Note: the authenticator app will warn you that reporting a fraudulent attempt may cause your account to be blocked or disabled, but this will only occur if you do not change your password promptly. 

 Why does the Microsoft Authenticator need to access my camera?

The Microsoft Authenticator needs access to your camera to take a picture of the QR code (a barcode-looking square) on your screen. It does not use camera access for anything else.

 Does the Microsoft Authenticator track me?

The Microsoft authenticator does not track you or log location data. The only push notifications it will ever send are approval requests for logins to Geneseo systems. The Microsoft Authenticator does not give CIT or Microsoft access to any data or information on your device.

 I don't have access to anything important why do I have to use MFA?

You may not think you have access to any information worth protecting, but all our faculty staff have access to secure information of one kind or another, from your W-2 (which an attacker could use to commit fraud and receive your tax return) to student health data, FERPA-protected student data, or college financial data.

If your Geneseo account is compromised, it could also be used to trick other Geneseo staff into responding to a phishing email. Your account can also allow an attacker to more easily access systems or compromise users who do have access to the data they are looking for.

Related articles


Still Need Help?

Ask CIT! Call (585-245-5588), email, chat, or submit a request and we'll be happy to assist you.






  • No labels