If you are unfamiliar with the concept of multi-factor authentication (MFA), please visit our overview page to learn the basics first before continuing.
- 1 What should I do to prepare for MFA?
- 2 Should I get the Microsoft Authenticator App?
- 3 How do I set up MFA?
- 4 Which MFA setup method should I choose?
- 5 How do I use Multi-factor Authentication once I have it set up?
- 6 How do I set up MFA to access Oracle or Blackbaud?
- 7 How do I change my MFA settings?
- 8 Related Pages
- 9 MFA Setup Guides
What should I do to prepare for MFA?
Check out our readiness info page for details. You'll learn useful tips to help ensure your Multi-Factor Authentication setup goes smoothly.
Should I get the Microsoft Authenticator App?
YES! Use of this app is the recommended way to work with your MFA account challenges and provides the smoothest experience for travelers. Visit our MS Authenticator App wiki page to learn how to download the app and get it set up.
How do I set up MFA?
ITS enables MFA on new accounts and sends a “Middlebury Multi-Factor Authentication Enrollment” email containing links to Microsoft’s MFA Setup page and our Security Info Quick Setup guide. Follow the instructions presented to set up authentication methods you wish to use with your account.
- Any device you wish to configure to use MFA must have a working network connection at the time of setup.
- By clicking the "Set it up now" button, you are activating Multi-Factor Authentication and you must complete the setup process or you may be unable to access your account, including your email.
Which MFA setup method should I choose?
Here are descriptions of the most common scenarios, along with our MFA setup recommendations for each one. Please visit our MFA verification wiki page for additional details about specific options.
Scenario A: I have a Smartphone -- and I travel internationally and/or travel in areas without cellular coverage.
- Choose Microsoft's Authenticator app with a code.
This method is recommended when you have a device that supports Microsoft's Authenticator app and you will be in areas without consistent network access. When presented with an MFA challenge you will need to input the code displayed by the Authenticator app to complete your login.
Network access is NOT required for the MS Authentication app to provide you with a code.
Scenario B: I have a Smartphone -- and I rarely travel in areas without cellular coverage.
- Choose Microsoft's Authenticator app with notifications.
This method is recommended when you have a device that supports Microsoft's Authenticator app and you will be in areas with consistent network access. When presented with an MFA challenge you will need to click Approve on your device to complete your login. Caution! Only click Approve when you have signed into a service you anticipate will trigger an authentication challenge.
Network access cellular or wifi IS required for the MS Authentication app to provide a notification.
Scenario C: I have a Flip or Feature phone.
- Choose Phone then specify Call or Text.
This method is recommended when you have a device that doesn’t support the Microsoft Authenticator app. When presented with an MFA challenge you will have to receive a phone call then press #, or else receive an SMS text message then enter the provided code, in order to complete your login.
Travel to areas without cellular coverage is not supported by this method.
How do I use Multi-factor Authentication once I have it set up?
Once you complete your MFA set up, here is what to expect.
- When you log in to an MFA-protected service (such as Webmail or Google) there is one additional step. After correctly entering your Middlebury email address and password at the login screen of the service you wish to access, you will be prompted to verify your login request. This could be in the form of a phone call, text message, or mobile app notification or code, depending on the option you specified during the setup process.
- For example, if you chose the "Notify me through the app" option, you would enter your Middlebury email address and password at the online service’s login screen, then you would receive a notification from the Microsoft Authenticator app on your mobile device prompting you to “Approve" or “Deny” the login request.
- During the login process you can click the checkbox to remember my device for 30 days. With this setting enabled, you won’t be prompted again for Multi-Factor Authentication from that application on that device for another thirty days.
- Caution! Only approve verification requests that you initiate! This is relevant to the "Notify me through app" and "Call my authentication phone" verification options. Imagine an online criminal has your password and is trying to access your account. Once Multi-Factor Authentication has been enabled for your account, this access attempt would generate a login verification request. If you approved this verification request, the criminal would be able to access your account!
How do I set up MFA to access Oracle or Blackbaud?
Oracle and Blackbaud accounts are provided by the Green Mountain Higher Education Consortium '('GMHEC) rather than Middlebury, and they require a separate MFA setup. If you are off-campus and you already have MFA protection for your Middlebury account, you will be prompted to enroll in GMHEC's multi-factor authentication (MFA) if you haven’t already enrolled. See “Enrolling in GMHEC Multi-Factor Authentication” for information.
How do I change my MFA settings?
Need to make changes because you'll be traveling or you want to use a different phone number? It's easy to change your multi-factor authentication settings. Here's how:
- Visit http://go.middlebury.edu/mfasetup. You will receive an MFA challenge.
- From the Security Info page, you'll find links that allow you to change or delete methods you set up previously, including your default method for receiving MFA challenges.
- Microsoft Authenticator App -- how to get it and set it up
- MFA Verification Methods
- MFA for GMHEC application access - GMHEC apps (such as Oracle and Blackbaud) have a separate MFA setup