Installing Multi-Factor Authentication (MFA) Management

Multi-Factor Authentication (MFA)

MFA Logo

All SUNY Geneseo students are required to use Multi-Factor Multi-factor authentication (MFA) when logging into campus systems to decrease the likelihood of others accessing their data.

Specifically, it enhances the security of your Geneseo User ID by using your phone, tablet, or other device to verify your identity when you attempt to access SUNY Geneseo’s network and resources. 

 

Don't get locked out!

Deleting Microsoft Authenticator or transferring it to a new phone will break the trust between Microsoft and your device, and you'll need to use one of your other configured MFA methods to reestablish that trust.

If have no other MFA methods configured and cannot sign in to your account, please call the CIT HelpDesk at 585-245-5588. They will verify your identity over the phone, and walk you through reestablishing a working MFA method.

Download the Microsoft Authenticator App

MFA Logo

The free Microsoft Authenticator app (available for iOS and Android devices) is our recommended authentication method and sends a "push" notification to your device to verify your login attempt.

It also provides a rotating code you can type in if your mobile device doesn't have internet connectivity and can't receive push notifications.

Please see Microsoft's official Authenticator App method documentation for instructions on adding this method to your account.

MFA App for iOS MFA App for Android


Adding MFA methods

  1. Access your Microsoft security info, or sign in to my.geneseo.edu.

  2. See below for specific instructions.

Phone Verification

For US phone numbers, located in the US only, Microsoft will call your phone number and prompt you to approve your pending sign-in.

Please see Microsoft's official phone method documentation for instructions on how to add this method to your account.

Text (SMS) Message

For US phone numbers, located in the US only, Microsoft will send a text (SMS) message with a code to be entered in the login window.

Please see Microsoft's official SMS method documentation for instructions on adding this method to your account.

Security Key

Any FIDO2-compatible physical security key can be registered and used with Geneseo accounts. See Microsoft 365 Passwordless Authentication for more details.

  1. Click on your initials in the upper right corner, and select "Manage Security Info" 

  2. To Add a method, click + Add method. If you do not have any methods, you will be automatically prompted to create your first one.

  3. Select the type of method you want to add.

  4. Follow the prompts for the selected method.

Just One Is Never Enough!

Configure multiple MFA methods so that losing one does not prevent you from accessing your Geneseo account! Common ways to lose access to MFA methods are:

  1. Getting a new phone - the Microsoft Authenticator app does not support transfer or backup/restore.

  2. Traveling abroad to a place where your US phone number cannot receive SMS or calls.


Remove an MFA Method

  1. Access your Microsoft security info

  2. Find the method you want to remove in the list and click the delete option


Change your default MFA method

  1. Access your Microsoft security info

  2. Click Change

  3. Select the method you would like to use from the drop down menu

Unexpected Notifications?

If you receive a notification when you are not attempting to log in, deny the request and use the 'report as fraud' function within the app.


"Other" Authenticator Apps

Any app that supports scanning MFA QR codes (ie. implements the Time-based One Time Password, or TOTP, protocol) may be used with your Geneseo account. The following are popular choices:

Add one of these apps by going to your Security Info page, then:

  1. Click the add sign-in method

  2. Select the authenticator app and click Add

  3. Click I want to use a different authenticator app

  4. Click next

  5. Follow the instructions from your other authenticator app for reading the QR code. Once your app displays a 6-digit code for this new account, click next

  6. Enter the 6-digit code displayed in your other authenticator app when prompted by Microsoft, and click next. This confirms to Microsoft that your other authenticator app correctly parsed the secret information in the QR code.

Available Methods

Troubleshooting and Questions

We are required to use MFA by new SUNY security guidelines. Our systems are under constant attack. The most common are password spray attacks, where attackers send thousands of logins using usernames and passwords harvested from the web, and phishing attacks, where attackers attempt to get your username and password. Multi-factor Authentication stops all these attacks. 

Suppose you would like a detailed analysis of how MFA protects logins. In that case, Your Pa$$word Doesn't Matter lays out Microsoft's research across millions of logins, explaining why passwords are insecure and how MFA results in protecting against all but the most targeted attacks.

Logins to most Geneseo web-based services and Microsoft's OneDrive and Office require you to sign in and use MFA at least every 14 days. Sign-in frequency varies between services based on security and vendor requirements.

When prompted to sign in, click on the Sign in another way button and select a new method.

You should notify the CIT HelpDesk immediately if you lose your phone or authenticator.

Yes. Using a device for multi-factor login comes with the obligation to take reasonable precautions to protect it. Such precautions normally include using a password or a PIN to unlock the phone and maintaining current versions of your device's operating system and Authenticator App.

Owner (area)

Support Services

Reviewed by

@David Blood

Review Date

Sep 10, 2024