Search27 Results

Learn how to set up Multi-Factor Authentication (MFA) with the Duo Mobile app
Our recommended security keys for use with UA's Multi-Factor Authentication systems, such as Duo.
Frequently asked questions (FAQ) regarding multi-factor authentication (MFA) and how it is used at the University of Alaska (UA).
Multi-Factor Authentication (MFA) adds extra protection to your accounts by requiring more than just a password—like a code sent to your phone or a fingerprint scan. It’s a simple way to keep your information secure and safer.
Generate a temporary one-day (24-hour) bypass code for Multi-Factor Authentication (MFA) — ideal for users who need a code before taking a proctored test or need to add a new device.
Duo offers support for Security Keys that can be used for Multi-Factor Authentication.
After setting up Multi-Factor Authentication (MFA) on a device, the Duo Prompt lets you choose how to verify your identity each time you log in.
This article will guide you through the process of replacing your old smartphone with a new one for Duo multi-factor authentication.
This article will help individuals to understand how the project request scoring process works within the Enterprise Service Management system.
This article will help department/organizational leadership to manage and evaluate project requests using the Enterprise Service Management (ESM) system.
You can add new devices to Duo through the Duo Prompt, and it’s a good idea to set up more than one authentication method so you’re never locked out of your account.
This article will help individuals to understand the impact of Days Off within the Enterprise Service Management (ESM) system on reports, and resource management.
A question we frequently receive is how much data/information can a person, or department, really store in X amount of space. Read on to find out about how common file/document types equates into space, and how many of those files can be stored in commons storage solutions available to the University of Alaska community.
Information, and general best practices when sending an email message to a Mailing list.
When handling incoming requests, sometimes it may not be clear as to if the work should be tracked as a ticket or as a project. The following article will provide some guidelines to use when determining which method to use based upon the request.