Skip to main content

General information about 2-factor authentication

What exactly is two-factor authentication?

Two-factor authentication, also known as 2FA, is a security procedure that secures logins by combining two different, independent factors. These factors must come from different categories, such as knowledge (password/PIN), biometrics (fingerprint), or possession (DUO token). At TU Brunswig, we will offer the DUO app for mobile devices and a desktop application for laptops/computers.

Why is 2FA being introduced at TU Brunswig?

Primarily, the second factor increases the security of the IT infrastructure. The protection of TU Brunswig's IT systems will be improved, thereby increasing the confidentiality, integrity, and availability of data. The goal is to make it more difficult for unauthorized individuals to access user accounts.

The university's executive board has decided to implement a two-factor authentication solution. Among the reasons for its implementation are the observed misuse of the central email system for sending phishing and spam emails through unauthorized access to email accounts, as well as the use of stolen credentials for online fraud. This will prevent the leakage of information from file systems and databases. At TU Brunswig, we will offer the DUO app for mobile devices and a desktop application for laptops/computers.

How does 2FA work at TU Brunswig?

First, the user is activated via the BDD during the optional second-factor phase. After a maximum of 45 minutes, the user can either log in to OWA (Outlook Web Access) or click the link in the activation email and complete the setup process, e.g., for their mobile device. For more detailed explanations/descriptions, there is a guide in the books (Two-Factor Authentication (2FA) with DUO). Once the user has completed this process, the second factor can be used, or rather, the second factor is ready for use.

If the mobile device is outdated or other reasons prevent its use, the user can switch to the desktop application.application In exceptional cases,or a tokenhardware will be issued to the user.token.

The following systems are currently secured with 2-factor authentication:

  • Outlook Web Access (OWA)
  • Virtual Private Network (VPN)
  • Single Sign-On (SSO)