Changes to 2FA Experience

Last updated: October 31, 2024
Audience: All UW

The UW regularly updates its two-factor authentication (2FA) features to provide secure sign-ins. Major updates are highlighted on this page.

This page design to keep you informed about the trusted UW 2FA experience and explain any changes. If you have questions about the security your 2FA experience or need help with UW 2FA, please contact help@uw.edu.

New Changes

The UW has updated the process for registering your 2FA devices and added support for new authentication methods. No action is required from you, but here’s what’s new:  

New Device Registration Experience

You can add, remove, or review your 2FA devices at https://identity.uw.edu/2fa. While the location remains the same, the page has a new look. You will now need to click a button to open the updated page.

A screenshot of Identity.UW focused on the new 2FA registration page
Pictured above, the new device registration experience

A screenshot of the new device management page asking for you to provide a 2FA method
Pictured above, the new “verify your identity” step

A screenshot of the new device management page
Pictured above, the new device registration page

 

A screenshot of Identity.UW focused on the old 2FA registration page
Pictured above, the old device registration experience

New Look for Registering Devices

New Look for Registering Devices

A screenshot of the new UI when selecting to add a new device
Selecting “Add a device” allows you to add “Duo Mobile”

A screenshot of the new Duo device management page on the first step of adding a phone with Duo Mobile
Enter your phone number

A screenshot of the new Duo device management page on the second step of adding a phone with Duo Mobile
Confirm your phone number

A screenshot of the new Duo device management page on the third step of adding a phone with Duo Mobile
Demonstrate you control your phone number

A screenshot of the new Duo device management page on the fourth step of adding a phone with Duo Mobile
Make sure you have Duo Mobile downloaded

A screenshot of the new Duo device management page on the fifth step of adding a phone with Duo Mobile
Scan the QR code with your phone via Duo Mobile

A screenshot of the new Duo device management page on the sixth step of adding a phone with Duo Mobile
If you don’t scan the QR code, you can instead email yourself the activation link

A screenshot of the new Duo device management page on the seventh step of adding a phone with Duo Mobile
Clicking the email activation link allows you to activate directly

A screenshot of the new UI when selecting to add a new device
Selecting “Add a device” allows you to add “Duo Mobile”

A screenshot of the new Duo device management page on the fourth step of adding a phone with Duo Mobile
Make sure you have Duo Mobile downloaded

A screenshot of the new Duo device management page on the fifth step of adding a phone with Duo Mobile
Scan the QR code with your phone via Duo Mobile

A screenshot of the new Duo device management page on the sixth step of adding a phone with Duo Mobile
If you don’t scan the QR code, you can instead email yourself the activation link

A screenshot of the new Duo device management page on the seventh step of adding a phone with Duo Mobile
Clicking the email activation link allows you to activate directly

A screenshot of the new UI when selecting to add a new device
Selecting “Add a device” allows you to add a security key

A screenshot of the new Duo device management page on the first step of adding a security key
Click to continue adding the security key

A screenshot of the new Duo device management page on the second step of adding a security key
Follow the prompts to add a security key

Platform authenticators are a new way to do authentication that utilize the biometric passkeys on your device. Platform authenticators are only available as a method of authentication for the device they are set up on (so if you set up your phone, you can’t select the phone’s platform authenticator when on your computer). The prompts to set up your platform authenticator will be specific to your device, but the example screenshots are included below for examples.

A screenshot of the new UI when selecting to add a new device
Selecting “Add a device” allows you to add a platform authenticator

A screenshot of the new Duo device management page on the first step of adding a platform authenticator on a windows device
On windows devices, you can utilize the “Windows Hello” platform authenticator

A screenshot of the new Duo device management page on the second step of adding a platform authenticator on a windows device
You can follow the prompts from your browser to finish setting up the platform authenticator

A screenshot of the new Duo device management page on the first step of adding a platform authenticator on an apple device
On an apple device, you can set up FaceID/TouchID

A screenshot of the new Duo device management page on the second step of adding a platform authenticator on an apple device
You will need to save the keychain in the iCloud keychain. If you don’t have your secrets managed by the iCloud keychain, you may need to change your settings.

A screenshot of the new Duo device management page on the third step of adding a platform authenticator on an apple device
Once you are doing setting up, you are good to go

 

A screenshot of the new UI when selecting to add a new device
Selecting “Add a device” allows you to add a phone

A screenshot of the new Duo device management page on the first step of adding a phone
Enter your phone number, and if it is a landline select the checkbox.

A screenshot of the new Duo device management page on the second step of adding a phone
Confirm it is your phone number

A screenshot of the new Duo device management page on the third step of adding a phone
Finalize adding the phone

A screenshot of the new Duo device management page on the second step of adding a landline
If you selected a landline on the first step and it has an extension, it can be added here. Otherwise, skip this step. You will continue the steps above.

New authentication methods enabled

Platform Authenticators

Platform authenticators are a new way to do authentication that utilize the biometric passkeys on your device. Platform authenticators are only available as a method of authentication for the device they are set up on (so if you set up your phone, you can’t select the phone’s platform authenticator when on your computer). The prompts to set up your platform authenticator will be specific to your device, and not all devices support Platform Authentication. Duo’s supported platforms are listed on their platform authenticator guide. How to set up platform authenticators can be found in the section above under “NEW: Setting up a platform authenticator” or on set up a platform authenticator.

Verified Push

Verified push is a more secure form of push based authentication, that requires you to type in the numbers shown on the screen into Duo Mobile. This form of “push notification” is considered more secure to push fatigue and other forms of attack. Verified push is not currently in use for integrations at the UW, but may start to appear in more secure applications. Application owners can read more about verified push on the altered 2FA experience page.

Previous Changes

Duo has updated the way 2FA looks during your sign-in experience. Documented below is the new and previous Duo behavior for reference.

Understanding new and previous Duo behavior

With the new Duo experience, how you normally start your sign-in process won’t change. In this example, you would sign in to the UW IdP using a UW NetID and password when signing into a site such as my.uw.edu. The sign in step looks the same.

A screenshot of the login page for the UW idP, requesting UW NetID and Password.
UW IdP sign in page

After providing your first factor (UW NetID and password), you are prompted to provide your second factor, which is your verification via Duo.

In the new Duo authentication, you will be automatically prompted with your last-used method. How you approve your Duo authentication method is not changing. However, with your first sign-in experience Duo may choose a method you do not typically use.

A screenshot of the new Duo prompt when selecting that Duo authenticate via a "push"
New Duo prompt experience

Many people at the UW prefer the Duo “Push” method for Duo authentication by default, while others choose passcodes or other methods. Note that if the “wrong” method is presented by default, you can choose Other options to select from a list of Duo methods (the available options will depend on what you have added at https://identity.uw.edu/2fa/ ). Any method you select when you’re first presented with the new Duo prompt will provide you the typical authentication experience.

 

A screenshot of the new Duo UI for selecting a method of authentication showing hardware token
New Duo method selection

In the previous Duo prompt, you were presented with a different approach to choosing  your authentication option. In this previous prompt, to see other available authentication options, you first had to click “cancel”.

A screenshot of the old Duo prompt experience, where the authentication options were displayed
Old Duo prompt experience

With the new Duo prompt, there is also a change in the URL that Duo presents in your browser. You will see duosecurity.com in the address.

A screenshot of the URL that is displayed during the new Duo login process. This screenshot shows the domain to expect in the new behavior is duosecurity.com
New Duo URL

Note that “duosecurity” in the URL will be correct; you will no longer see “idp.u.washington.edu” in the web address when being asked for Duo.

A screenshot of the URL of the webpage used in the old Duo flow. In the screenshot, it is shown that the URL is idp.u.washington.edu
Old Duo URL

Other legitimate UW applications and websites may display a different URL during sign-in, where you see something besides the two web addresses shown above. If the web address looks unfamiliar or suspicious, you should stop signing in, and not do any further authentication. You can instead take a screenshot and contact help@uw.edu, and provide the screenshot to have it checked as legitimate or not.

With the new Duo prompt experience, there is also a change to how to select “remember me” for future sign-ins. The actual handy behavior of “remember me” is not changing; you can read more about this at https://itconnect.uw.edu/tools-services-support/access-authentication/2fa/remember-me/.

In the new Duo experience, you will be asked “Is this your device?” If you select “Yes, this is my device”, Duo will remember your device for the next 30 days just as “remember me” would do. If you select “No, other people use this device,” then Duo will prompt you for 2FA the next time you log in with that browser.

A screenshot of the new Duo page that asks if you would like to have Duo "remember this device" which operates in the same way the current "remember me" behavior is.
New Duo “Remember Me”

The language in the new process similarly mirrors the behavior of the previous “Remember me on this browser” check box. Unchecked, you would be prompted for Duo on your next sign-in with that browser, while checking it gives you a 30-day period where this browser would no longer require 2FA upon sign-in.

While the look and language have changed, the familiar behavior of “Remember me” stays the same.

A screenshot of the old Duo "remember me" option wherein you could place a check mark on the option during Duo authentication to have the device remembered for 30 days.
Old Duo “Remember Me”

Contrasting New and Old Duo Authentication Methods

Previous changes to 2FA also updated the look while authenticating. Each method’s changes are captured below.

Contrasting New and Old Duo Authentication Methods

A screenshot of the new Duo prompt when selecting that Duo authenticate via a "push"
New push

 

A screenshot of the old Duo prompt when selecting that Duo authenticate via a "push"
Old push

A screenshot of the new Duo prompt when selecting that Duo authenticate via Duo Mobile passcode
New

A screenshot of the old Duo prompt when selecting that Duo authenticate via Duo Mobile passcode
Old

A screenshot of the new Duo prompt when selecting that Duo authenticate via hardware token

A screenshot of the new Duo prompt when selecting that Duo authenticate via security token
New

A screenshot of the old Duo prompt when selecting that Duo authenticate via hardware token
Old

A screenshot of the new Duo prompt when selecting that Duo authenticate via YubiKey
New

A screenshot of the old Duo prompt when selecting that Duo authenticate via YubiKey
Old

A screenshot of the new Duo prompt when selecting that Duo authenticate via phone call
New

A screenshot of the old Duo prompt when selecting that Duo authenticate via phone call
Old

A screen displaying the new Duo prompt when entering a bypass code provided by UW-IT
New

A screen displaying the old Duo prompt when entering a bypass code provided by UW-IT
Old