
What to expect with two-step authentication You are strongly encouraged to set up a backup device in case your primary device is lost or unavailable. Stanford Login prompts you to authenticate using your default device and preferred method but you have the option of authenticating using a different device (if you have other devices set up) or method. One device must be designated as your default device, and your default device must have a preferred way to authenticate. To get started, select the device you want to set up: The Duo Mobile app is the preferred replacement. However, you are no longer able to set up Google Authenticator on your smartphone or tablet. Note: If you currently use Google Authenticator for your second factor you can continue to do so. A U2F/FIDO2 compatible device (such as Yubikey) can facilitate passcodeless two-factor authentication.With the enablement of the Security Key option, an existing Yubikey used to generate a passcode should be self-enrolled as a Security Key, after which the previous Yubikey record can be removed (unless there is still a need for passcode-based authentication for non-web-enabled services).A "keychain" hardware token displays two-step codes at a push of a button.Mobile phones with SMS text messaging capability.Duo Mobile push notification (recommended).Each device has one or more authentication methods available. There are seven physical devices that you can use to provide the second factor of two-step authentication. This approach protects your Stanford account from fraudulent access. Then you need a physical device such as your mobile phone, tablet, or landline phone to complete the login.

First, you enter your SUNet ID and password. Two-step authentication uses two forms of authentication to verify your identity. Risk Classifications: Approved Services.Watch Information Security Awareness Video.
