Managing your IBM Verify authenticators
Configure and manage authentication factors for two-step verification (2FA) to secure your IBM® Verify account. Two-step verification (2FA) enhances account security by requiring a second authentication method to verify your identity when your access your IBM Verify account on a computer or mobile device.
Before You Begin
To use the IBM Verify mobile app as an authenticator, download and install it from the App Store or Google Play.
If your application or security policies require 2FA, you must register at least one instance of the IBM Verify mobile authenticator app to enable it as a 2FA option during authentication.
Adding an authentication method
You can add a new authentication method, such as the IBM Verify app, another authenticator app, passkey, text messaging, email, or phone call, to enable two-step verification for your account.
Procedure
Adding the IBM Verify app
Register the IBM Verify app as an authenticator for two-step verification.
Procedure
Adding another authenticator app
Set up a third-party authenticator app for two-step verification. You can have one
Authenticator app only. If the IBM Verify
app is already registered as an authenticator app, you must remove it first by selecting the more
options menu () and clicking Remove
authenticator.
Procedure
Setting up a passkey
Configure a passkey by using your device's built-in authentication methods, such as biometrics or PIN.
Procedure
- Click .
-
To setup a built-in passkey, do the following steps:
- Select an authentication method and follow the prompts.
- Click OK to save the passkey.
-
To setup an external security passkey, do the following steps:
- Select Security key and click Next.
- Click .
- Insert your security key, enter the PIN, and click OK.
- Touch the security key and click OK to save the passkey.
- If prompted, click Allow.
- Enter a friendly name for the passkey and click Done.
Setting up text messaging
Configure text messaging as an authentication method for receiving one-time passcodes.
Procedure
Setting up email authentication
Configure an email address to receive one-time passcodes for two-step verification.
Procedure
Setting up phone call authentication
Configure a phone number to receive verbal access codes for two-step verification.
Procedure
Removing an authentication method
If you no longer want to use an authentication method, you can remove it from your device.
About this task
- If you are within the grace period, after the removal you might see notifications about the required number of enrollments.
- If you are not within the grace period, after the removal you must complete the required number of enrollments the next time you authenticate.
Procedure
-
Hover over the authenticator and click the more options menu icon (
).
- Click Remove authenticator and click confirm.
Testing an authentication method
To test the operation of an authenticator, do the following steps.
Procedure
Managing security questions
If the security questions feature is enabled for your tenant, you can answer the questions as a multi-factor authentication option.
About this task
Security questions are an older authentication method and are not as secure as other authentication factors. This feature is provided to accommodate the existing requirements of some customers. If you must use security questions, contact your tenant orchestration administrator to enable the security questions feature on your tenant.
Procedure
- Log in to IBM Verify.
- Set up security questions as an authentication factor.
- Modify your security questions.
Managing your MDM devices
You can view, and delete your devices that are registered to access IBM Verify.
About this task
Devices must be registered through Microsoft™ Intune or Jamf.
When you delete a device from IBM Verify, it is not deleted from the device manager.