Multi-Factor Authentication (MFA) is a measure which improves account security over standard password authentication. MFA typically adds a second factor to confirm your identity by using an authenticator app on your mobile device or a compatible hardware device. MFA will help keep your information secure by strengthening defences against malicious cyber-attacks. You may not always be asked for MFA when logging in, however it will always be in use.
Once you have created your MFA login, you will need to have your registered mobile device with you whenever you need to log into a JCU system, like LearnJCU or your email.
Enabling Multi-factor Authentication at JCU with your mobile phone.
MFA at JCU
Most breaches begin when attackers log in using usernames and passwords they have compromised through phishing attacks, passwords being reused, guessing passwords and malware.
MFA reduces the risks associated with compromised passwords by adding an additional layer of security to protect your information. If your password is hacked or phished, MFA makes the stolen password less useful by itself.
When multi-factor authentication has been activated on an account, an authorisation check will be sent to the user any time they attempt to log in from a different device, a new location, or multiple locations. Authorisation checks may also be required after a set time has elapsed, or as the result of a higher risk login. The authorisation check can come in the form of:
a push notification sent to a registered smart phone;
or a one-time password displayed on the user's phone;
or a compatible hardware device (e.g.: YubiKey)
Using your existing mobile phone is often the most convenient form of MFA.
When you login to a JCU system (once MFA-enabled) you will be prompted to register your mobile phone/hardware device for MFA.
Remember to save your Recovery Codes when they are displayed through the registration process to somewhere secure. Consider these Recovery Codes as your one-time passwords to log in if you don't have your mobile phone on you. Keep them safe and secure.
No. JCU’s MFA uses an adaptive, risk-based approach. If you use the same computer or device, from the same place, you will be prompted for MFA infrequently (up to 30 days). If you are moving around between different networks, devices and geographic locations, you’ll be prompted more often.
If you don’t have a mobile device or don't want to use your personal device for MFA, then either:
STAFF: your business unit will be required to purchase a hardware device (YubiKey)
If you don't have an enrolled device or have used all your recovery codes, then contact the IT Help Desk for further assistance.
ForgeRock Push Authentication needs internet connectivity (e.g. mobile data or Wi-Fi) to work. If you are worried about poor mobile data coverage or reliable Wi-Fi reception then we recommend using the OATH one time password method with a Google or Microsoft authenticator app. Or if this is a one-off or infrequent issue you can use the Recovery Codes you saved when setting up MFA, which doesn’t require a second device to confirm MFA.
Please note: you should not be using your recovery codes for regular MFA authentication as you will need to reset your device to generate new codes.
If you leave your phone at home you will need to use one of the recovery codes you received when setting up MFA. Recovery codes are one-time use and should be stored in a Password Safe (e.g.: LastPass or Bit Warden) for security.
If you have used all of your MFA one-time Recovery Codes then you will need to contact the IT Help Desk who will assist you with resetting your MFA.
If you have deleted your account from the Authenticator App or removed the App from your mobile device then you can use one of your MFA one-time Recovery Codes to reset your MFA. If you did not make a copy of your Recovery Codes or do not have them available to you then you will need to contact the IT Help Desk who will assist you with resetting your MFA.