Description: This field is used as the name in the interface.Note the Configuration Status is Enabled by default.Select Add New Secondary Configuration > Duo 2 Factor.On the Authentication page, click the Secondary tab in the Configurations panel.Under Configuration, click Authentication.You first sign up for a Duo Administrator account at the following location: To set up Duo 2FA, administrator permissions are required. For example, the screenshot below shows the secondary authentication step once a verification passcode that has been sent to his/her cell phone via SMS/text message, voice call, or the Duo mobile application: The second credential/verification code is asked for after the user has successfully authenticated with LabKey Server's username/password combination. A user might be required to provide a six-digit verification code (sent to the user's cell phone over SMS) in addition to their username/password combination. Two-factor authentication requires users to provide an additional piece of information to be authenticated. ![]() Most of the configuration decisions about the nature of your two-factor authentication service occur within the Duo Security account, not within LabKey Server. LabKey Server administrators who wish to take advantage of two-factor authentication will need to open a paid account with Duo Security - although evaluation and testing can be accomplished with a free trial account. Duo Security provides a variety of secondary authentication methods, including verification codes sent over SMS messages, audio phone calls, and hardware tokens. LabKey Server supports two-factor authentication through integration with Duo Security. API keys or session-specific keys are required for using the LabKey APIs when Duo is enabled. Note that basic username/password authentication is disabled if Duo authentication is enabled.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |