Best Practices - ECU Multifactor Authentication

IT Service Desk 252-328-9866 | Pirate Techs Technology Support Centers | Submit a Ticket

Skip to a section: Overview | Best Practices

Available to

Faculty, Staff, Students

Overview

All ECU users configure Azure Multifactor Authentication* through their Microsoft 365 account when onboarding to ECU. Azure MFA allows log in to email, Canvas and other single sign-on applications. 

Recommended Best Practices

Follow these recommended best practices to ensure a smooth, secure experience when accessing the ECU resources you use every day.

Best Practice No. 1 – Make Microsoft Authenticator app your default sign-in method.

Once configured for your mobile phone or tablet (check app store for device compatibility), the access code can be used offline if network and cellular access is unavailable.

  • Configure the Microsoft Authenticator app on a mobile device.
  • Enable push notifications for Authenticator through your device's settings.
  • Requires no internet and verify through code or number matching.
  • Best for international travelers.
     

Best Practice No. 2 – Configure multiple MFA methods.

If your mobile device is unavailable, you can use an alternate authentication method.

  • Phone call. Set up a phone number to receive a voice call from Microsoft. Add up to three different phone numbers (does not have to be a mobile). 
  • Text. Receive a code. 
  • Windows Hello for Business. ECU-managed Windows 11 computers. 6-digit code authenticates your account for your computer and single sign-on resources.
     

Best Practice No. 3 – Work around weak cellular signals.

  • Enable Wi-Fi calling to receive calls on your mobile over the Wi-Fi network rather than cellular signals.
  • See this information for onboarding your devices to eduroam, ECU's primary Wi-Fi network.
  • Use the Microsoft Authenticator app which can generate a verification code without an internet connection or cellular signal. The Authenticator app is the recommended default method for users.

 

Best Practice No. 4 – Periodically check app updates and verification settings.

  • Regularly update the Microsoft Authenticator app to the latest version for improved security and features.
  • Review and update your secondary authentication methods to ensure phone numbers and email addresses are up to date.

 

Best Practice No. 5 – Follow these security tips.

  • Do Not Share Codes. Never share your verification codes with anyone.
  • Do not approve an unexpected MFA prompt until you check your recent activity.
  • Check your account’s recent activity through the Microsoft 365 My Sign-ins page. Ignore unsuccessful attempts, but a successful sign-in from a location you don’t recognize should be reported to the IT Service Desk.

 

Best Practice No. 6 – Contact Pirate Techs if you cannot log in

  • Call the IT Service Desk at 252-328-9866. 
  • Visit your nearest Pirate Techs walk-in location. 
  • Quick assistance to access your account if you are unable to authenticate. For example, you left your mobile phone at home.

 

Print Article

Related Articles (1)

List of Knowledge Base account authentication (MFA) articles for ECU users.