MFA (Multi-factor Authentication)

As cyber threats have increased in recent years, simple reliance on password protection is insufficient to keep your data and resources safe.  Multi-factor authentication (MFA) is necessary for off-campus access to many JHU services, including access to the campus network via the VPN.  MFA requires at least 2 of the following: something you know (JHED ID and password), something you have (your phone), or something you are (biometric factor, such as a fingerprint or facial scan). Microsoft Azure MFA is deployed, with Microsoft Authenticator as the university’s choice for MFA on mobile devices.

“Number Matching” is the standard for mobile MFA.  When you login to a protected application you will be presented with a 2-digit number and will receive a request to approve on your designated authentication device.  Enter the number and press “Yes” to approve the connection.  The number matching service will provide contextual information, including the application being accessed and a map location from which the sign-in attempt originated.thumbnail image 2 captioned Figure 2 - Additional Context with number match in notifications

Please note that number matching is not yet available on smartwatches (e.g. Apple Watch), but Microsoft hopes to have this enabled in future.  Those who use the OTP code in their authenticator, or use MFA via SMS text or phone call, will see no change.  If you would like to switch to number matching from your current MFA method you can login to myit.jh.edu, select the “myPolicies” tile and select Enable MFA Number Match and Authentication Context. 

For more information please see the MFA Resource Center.