Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This page lists the acceptable 2FA options for remote access to university devices which store or process Category I data. Certain options may work better in specific environments than others - consult your local IT support staff for any implementation questions or issues. If you need to use a 2FA option not on this list, please contact us at security@utexas.edu.

Remote administrator access to workstations and non-server devices should be handled through utilize 2FA options, such as the UT VPN service.

Note: Users MUST utilize 2FA for devices they have administrative access to, even when authenticating using non-administrative credentials, if the ability exists for users to elevate permissions to an administrative level after authenticating as a lower-privileged user. If no ability to escalate permissions exists, then only logins using administrative credentials need be secured with 2FA, unless such differentiation is not possible.

...