2-Step Verification for Google Apps at Brown

Field to enter code and verify itStarting in October, Brown Google (GAE) users will be able to add an extra layer of security to their account when accessing it via their mobile phones by using Google’s 2-Step Authentication feature.

CIS will enable this Google feature on October 1st as an opt-in/opt-out service. The following FAQ provides you with a little background on this new service.

WHAT IS IT?

GAE 2-step verification adds an extra layer of security to users’ GAE account. It requires anyone who opts in to use a verification code after entering their username and password.

WHY USE IT?

The are several reasons to begin using it. GAE’s 2-step verification:

  • Protects the user should someone get hold of their password.
  • Protects against users using the same passwords from multiple sites.
  • Protects against logging in to account on public computers.

Three different kinds of smartphonesWHAT ARE THE REQUIREMENTS?

To get started all you need is:

  • A mobile phone that accepts SMS text messages
  • A Droid, Blackberry or iPhone with the Google Authenticator app
  • Be set up at the domain level

HOW DOES IT WORK?

  1. Behind the scenes, the domain administrator enables 2-step authentication.
  2. Enroll in the service using your Settings (select Settings > Accounts > Google Account Settings > Security > 2-step verification Edit).
  3. Select the method to receive verification codes.
  4. Google accounts dialog box where you enter your verification codeEnter your username and password.
  5. Upon hitting enter, a verification code is sent, and the verification code screen appears.
  6. You then receive a time-based, one-time code for GAE to successfully log in. Note: If you were to lose your phone, you can use a back-up code to sign in (supplied when you start up the service).
  7. If you are on a trusted computer, you can check the box to stay “logged in”, and you won’t need to do the 2-step for another 30 days.

Resources

Posted in Fall 2012 Edition, Safe Computing | Comments Off