Changes to 2FA Experience


The UW regularly updates its two-factor authentication (2FA) features to provide secure sign-ins. Major updates are highlighted on this page. This page design to keep you informed about the trusted UW 2FA experience and explain any changes. If you have questions about the security your 2FA experience or need help with UW 2FA, please contact help@uw.edu.

New Changes

The UW has updated the process for registering your 2FA devices and added support for new authentication methods. No action is required from you, but here's what's new:

New Device Registration Experience

You can add, remove, or review your 2FA devices at https://identity.uw.edu/2fa. While the location remains the same, the page has a new look. You will now need to click a button to open the updated page.

A screenshot of Identity.UW focused on the new 2FA registration page

Pictured above, the new device registration experience A screenshot of the new device management page asking for you to provide a 2FA method Pictured above, the new "verify your identity" step A screenshot of the new device management page Pictured above, the new device registration page   A screenshot of Identity.UW focused on the old 2FA registration page Pictured above, the old device registration experience

 

New Look for Registering Devices

New Look for Registering Devices

A screenshot of the new UI when selecting to add a new device Selecting "Add a device" allows you to add "Duo Mobile" A screenshot of the new Duo device management page on the first step of adding a phone with Duo Mobile Enter your phone number A screenshot of the new Duo device management page on the second step of adding a phone with Duo Mobile Confirm your phone number A screenshot of the new Duo device management page on the third step of adding a phone with Duo Mobile Demonstrate you control your phone number A screenshot of the new Duo device management page on the fourth step of adding a phone with Duo Mobile Make sure you have Duo Mobile downloaded A screenshot of the new Duo device management page on the fifth step of adding a phone with Duo Mobile Scan the QR code with your phone via Duo Mobile A screenshot of the new Duo device management page on the sixth step of adding a phone with Duo Mobile If you don't scan the QR code, you can instead email yourself the activation link A screenshot of the new Duo device management page on the seventh step of adding a phone with Duo Mobile Clicking the email activation link allows you to activate directly
A screenshot of the new UI when selecting to add a new device Selecting "Add a device" allows you to add "Duo Mobile" A screenshot of the new Duo device management page on the fourth step of adding a phone with Duo Mobile Make sure you have Duo Mobile downloaded A screenshot of the new Duo device management page on the fifth step of adding a phone with Duo Mobile Scan the QR code with your phone via Duo Mobile A screenshot of the new Duo device management page on the sixth step of adding a phone with Duo Mobile If you don't scan the QR code, you can instead email yourself the activation link A screenshot of the new Duo device management page on the seventh step of adding a phone with Duo Mobile Clicking the email activation link allows you to activate directly
A screenshot of the new UI when selecting to add a new device Selecting "Add a device" allows you to add a security key A screenshot of the new Duo device management page on the first step of adding a security key Click to continue adding the security key A screenshot of the new Duo device management page on the second step of adding a security key Follow the prompts to add a security key
Platform authenticators are a new way to do authentication that utilize the biometric passkeys on your device. Platform authenticators are only available as a method of authentication for the device they are set up on (so if you set up your phone, you can't select the phone's platform authenticator when on your computer). The prompts to set up your platform authenticator will be specific to your device, but the example screenshots are included below for examples. A screenshot of the new UI when selecting to add a new device Selecting "Add a device" allows you to add a platform authenticator A screenshot of the new Duo device management page on the first step of adding a platform authenticator on a windows device On windows devices, you can utilize the "Windows Hello" platform authenticator A screenshot of the new Duo device management page on the second step of adding a platform authenticator on a windows device You can follow the prompts from your browser to finish setting up the platform authenticator A screenshot of the new Duo device management page on the first step of adding a platform authenticator on an apple device On an apple device, you can set up FaceID/TouchID A screenshot of the new Duo device management page on the second step of adding a platform authenticator on an apple device You will need to save the keychain in the iCloud keychain. If you don't have your secrets managed by the iCloud keychain, you may need to change your settings. A screenshot of the new Duo device management page on the third step of adding a platform authenticator on an apple device Once you are doing setting up, you are good to go  
A screenshot of the new UI when selecting to add a new device Selecting "Add a device" allows you to add a phone A screenshot of the new Duo device management page on the first step of adding a phone Enter your phone number, and if it is a landline select the checkbox. A screenshot of the new Duo device management page on the second step of adding a phone Confirm it is your phone number A screenshot of the new Duo device management page on the third step of adding a phone Finalize adding the phone A screenshot of the new Duo device management page on the second step of adding a landline If you selected a landline on the first step and it has an extension, it can be added here. Otherwise, skip this step. You will continue the steps above.

New authentication methods enabled

Platform Authenticators

Platform authenticators are a new way to do authentication that utilize the biometric passkeys on your device. Platform authenticators are only available as a method of authentication for the device they are set up on (so if you set up your phone, you can't select the phone's platform authenticator when on your computer). The prompts to set up your platform authenticator will be specific to your device, and not all devices support Platform Authentication. Duo's supported platforms are listed on their platform authenticator guide. How to set up platform authenticators can be found in the section above under "NEW: Setting up a platform authenticator" or on set up a platform authenticator.

Verified Push

Verified push is a more secure form of push based authentication, that requires you to type in the numbers shown on the screen into Duo Mobile. This form of "push notification" is considered more secure to push fatigue and other forms of attack. Verified push is not currently in use for integrations at the UW, but may start to appear in more secure applications. Application owners can read more about verified push on the altered 2FA experience page.

Previous Changes

Duo has updated the way 2FA looks during your sign-in experience. Documented below is the new and previous Duo behavior for reference.

Understanding new and previous Duo behavior

With the new Duo experience, how you normally start your sign-in process won't change. In this example, you would sign in to the UW IdP using a UW NetID and password when signing into a site such as my.uw.edu. The sign in step looks the same. A screenshot of the login page for the UW idP, requesting UW NetID and Password. UW IdP sign in page
After providing your first factor (UW NetID and password), you are prompted to provide your second factor, which is your verification via Duo. In the new Duo authentication, you will be automatically prompted with your last-used method. How you approve your Duo authentication method is not changing. However, with your first sign-in experience Duo may choose a method you do not typically use. A screenshot of the new Duo prompt when selecting that Duo authenticate via a "push" New Duo prompt experience Many people at the UW prefer the Duo "Push" method for Duo authentication by default, while others choose passcodes or other methods. Note that if the "wrong" method is presented by default, you can choose "Other options" to select from a list of Duo methods (the available options will depend on what you have added at https://identity.uw.edu/2fa/ ). Any method you select when you're first presented with the new Duo prompt will provide you the typical authentication experience.   A screenshot of the new Duo UI for selecting a method of authentication showing hardware token New Duo method selection In the previous Duo prompt, you were presented with a different approach to choosing your authentication option. In this previous prompt, to see other available authentication options, you first had to click "cancel". A screenshot of the old Duo prompt experience, where the authentication options were displayed Old Duo prompt experience
With the new Duo prompt, there is also a change in the URL that Duo presents in your browser. You will see duosecurity.com in the address. A screenshot of the URL that is displayed during the new Duo login process. This screenshot shows the domain to expect in the new behavior is duosecurity.com New Duo URL Note that "duosecurity" in the URL will be correct; you will no longer see "idp.u.washington.edu" in the web address when being asked for Duo. A screenshot of the URL of the webpage used in the old Duo flow. In the screenshot, it is shown that the URL is idp.u.washington.edu Old Duo URL Other legitimate UW applications and websites may display a different URL during sign-in, where you see something besides the two web addresses shown above. If the web address looks unfamiliar or suspicious, you should stop signing in, and not do any further authentication. You can instead take a screenshot and contact help@uw.edu, and provide the screenshot to have it checked as legitimate or not.
With the new Duo prompt experience, there is also a change to how to select "remember me" for future sign-ins. The actual handy behavior of "remember me" is not changing; you can read more about this at https://it.uw.edu/tools-services-support/access-authentication/2fa/remember-me/. In the new Duo experience, you will be asked "Is this your device?" If you select "Yes, this is my device", Duo will remember your device for the next 30 days just as "remember me" would do. If you select "No, other people use this device," then Duo will prompt you for 2FA the next time you log in with that browser. A screenshot of the new Duo page that asks if you would like to have Duo "remember this device" which operates in the same way the current "remember me" behavior is. New Duo "Remember Me" The language in the new process similarly mirrors the behavior of the previous "Remember me on this browser" check box. Unchecked, you would be prompted for Duo on your next sign-in with that browser, while checking it gives you a 30-day period where this browser would no longer require 2FA upon sign-in. While the look and language have changed, the familiar behavior of "Remember me" stays the same. A screenshot of the old Duo "remember me" option wherein you could place a check mark on the option during Duo authentication to have the device remembered for 30 days. Old Duo "Remember Me"

Contrasting New and Old Duo Authentication Methods

Previous changes to 2FA also updated the look while authenticating. Each method's changes are captured below.

Contrasting New and Old Duo Authentication Methods

A screenshot of the new Duo prompt when selecting that Duo authenticate via a "push" New push   A screenshot of the old Duo prompt when selecting that Duo authenticate via a "push" Old push
A screenshot of the new Duo prompt when selecting that Duo authenticate via Duo Mobile passcode New A screenshot of the old Duo prompt when selecting that Duo authenticate via Duo Mobile passcode Old
A screenshot of the new Duo prompt when selecting that Duo authenticate via hardware token A screenshot of the new Duo prompt when selecting that Duo authenticate via security token New A screenshot of the old Duo prompt when selecting that Duo authenticate via hardware token Old
A screenshot of the new Duo prompt when selecting that Duo authenticate via YubiKey New A screenshot of the old Duo prompt when selecting that Duo authenticate via YubiKey
Old
A screenshot of the new Duo prompt when selecting that Duo authenticate via phone call New A screenshot of the old Duo prompt when selecting that Duo authenticate via phone call Old
A screen displaying the new Duo prompt when entering a bypass code provided by UW-IT New A screen displaying the old Duo prompt when entering a bypass code provided by UW-IT Old