Note: The MFA methods and authentication settings mentioned in this guide may or may not be applicable to you based on your organization's policy. Contact your administrator for more information on this.
Identity360 offers additional layers of security during identity verification using the information you provide during the enrollment process.
Once you've enrolled in the authentication methods, you will be prompted to perform MFA every time you access your machine, applications, and the Identity360 portal based on your organization's policy.
Here is a list of MFA methods available in Identity360 and how to use them:
You must enter the code that is displayed in the Google Authenticator app in the Enter Verification Code field and click Verify to prove your identity.
You must enter the code that is displayed in the Microsoft Authenticator app in the Enter Verification Code field and click Verify to prove your identity.
You must enter the code that is displayed in the Zoho OneAuth app in the Enter Verification Code field to and click Verify to prove your identity.
Enter the TOTP generated by the custom TOTP authenticator used by your organization in the Enter Verification Code field provided and click Verify to prove your identity.
Identity360 offers backup codes for MFA recovery. These one-time-use backup codes allow you to prove your identity in case your MFA device is not reachable or you're unable to use your enrolled MFA methods.
Depending on your organizational policy, you can generate these codes when required.
You will be provided with the Generate Backup Codes option in the user portal. To access it:
Note: If you aren't able to perform MFA using your enrolled methods and don't have any backup codes either, reach out to your administrator for assistance.
If you've successfully performed MFA at least once, you may be asked if you wish to trust the browser for a specific number of days. If yes, you will not be asked to perform MFA during future attempts of identity verification from the same browser within the specified days.
After completing MFA authentication while logging in to your machine, remotely accessing it, or during the UAC prompts, you can use this option to bypass MFA during your subsequent machine access. The trusted machine status will expire after a specified number of days based on your organization's policy.
When performing MFA using any of the enrolled methods, if you surpass the wrong MFA attempt limit set by your administrator, you'll be asked to enter the CAPTCHA displayed in the field provided. This helps confirm your identity as a valid user and ensures you're not an automated bot.
Copyright © 2024, ZOHO Corp. All Rights Reserved.