Passwords are no longer enough: we need Duo Two-Step Login to protect our financial data, our student data (including health records) and our research data, and also to protect the reputation of the University. Each year, sophisticated “phishing” schemes and other tactics lead to hundreds of ONID accounts becoming “compromised” (accessible to unauthorized people), and that number continues to increase. Nationally, other universities have been adopting two-step login for several years, and it’s time for us to join them. It’s our responsibility as good “digital citizens” to protect the data entrusted to our care.
The rate of compromised OSU accounts has dramatically increased both here and in higher education. Other universities across the country have responded to similar increases by requiring DUO, or similar two-step login processes, for all accounts. We are requiring all members of the OSU community to use two-step login as it is the best way to reduce the number of compromised accounts.
Duo helps us protect against attempts to steal information entrusted to our care, including: financial data, student and employee records, and sensitive medical and human subjects data. With Duo, we can prevent:
Many of our peer institutions, including Arizona State University, Berkely, Purdue, UC Davis and others have already implemented mandatory two-step login (sometimes referred to as multifactor authentication).
Two-step login is a way to protect your account by requiring both something you know (password) with something you have (smartphone, tablet, or hardware token). You start by logging in with your username and password, then confirm that it's really you with your Duo device.
Passwords are not enough. They can often be stolen, guessed, or hacked, and you may not even realize your password has been compromised. With Duo two-step login on your account, a compromised password doesn't have to mean a compromised account.
The Duo Mobile app is available for Android and iOS. Duo Mobile also works with the Apple Watch, Touch ID on some MacBooks and security keys like Yubikey. Duo hardware tokens can be used in addition to, or instead of, the Duo Mobile app. See below for more information about Duo hardware tokens.
Yes you can. In fact, if you have more than one device, we strongly recommend it. It provides you with options if something unfortunate happens to one of your devices. You can register more than one smartphone or tablet. However, you can register only one hardware token for your account. Don't have a smartphone? See below.
No. Deleting the Duo app will not unenroll you from Duo. Deleting the app, without a secondary device registered, will lock you out of your ONID account. Reinstalling the Duo app will not grant access until it is re-registered to your account.
If you deleted the app and need to reactivate it on your phone, use Device reactivation.
Android: Launch the Play Store app and search for “Duo Mobile”. Choose the Duo Mobile app from Duo Security, Inc., (not Google Duo). Download and install the application.
iOS: Launch the App Store app and search for “Duo Mobile”. Choose the Duo Mobile app from Duo Security, Inc. (not Google Duo.) Download and install the application.
Duo hardware tokens are small devices (about the size of a car key fob) which can be used with Duo instead of a mobile device. See the Hardware Token page for detailed information about how to obtain a Duo hardware token. Security keys are small devices that plug into your computer and can be used for Duo authentication, by simply touching them or using NFC on your phone.
You can generate a passcode by opening the Duo app and tapping the entry for Oregon State University. A six digit code will be displayed. You can enter the six digit code onto the OSU Login two-step screen by selecting the passcode option. You could also use a hardware token or security key.
Changing your SIM card will not impact your Duo use because the app is tied to the device's hardware security module (HSM). You will still be able to use your phone with Duo.
You should report all Duo Push messages that you did not generate. This may be a sign of someone attempting unauthorized access to your account, and your password may be compromised. Deny the push notification and then confirm that it’s a fraudulent attempt. You should change your ONID password if this occurs.
Yes. Using a device for two-step login comes with the obligation to take reasonable precaution to protect it. Such precautions normally include the use of a password or a PIN to unlock the phone, as well as maintaining current versions of your device's operating system and Duo Mobile.
Many authentication failures, including missing push notifications or entering invalid passcodes, will cause your account to be locked for 30 minutes.
If you have a secondary device registered, such as a tablet, hardware token or security key, you can still use that device to access your account. If you get a new phone with the same phone number, you can use Device Reactivation to activate it.
If you do not have a secondary device, and do not have a new phone with the same phone number, you will need a bypass code to access your account.
If your phone number is the same, you can use Device Reactivation to activate the new phone.
If your phone number has changed, and you do not have a secondary device with which to Duo, you will need a bypass code to register the new phone. Please see this article for the procedure to activate your new phone. If you know you are getting a new phone with a different number, you can get a temporary Duo code to make the transition easier.
In order to receive a bypass code, you need to have your identity verified. This is typically done with photo ID in person or via a video chat. Your ID cannot be verified by email.
The IS Service Desk can generate a bypass code for any user. You can contact the IS Service Desk by visiting them in Milne 201 or by calling 541-737-8787. It is strongly recommended that you call or visit in person. If you are unable to call or visit, you may also submit a ticket, but it may take longer to resolve your issue.
In addition, you can receive a bypass from a local IT support group if it is on the following list: