Managing your IBM Verify authenticators
Configure and manage authentication factors for two-step verification (2FA) to secure your IBM® Verify account. Two-step verification (2FA) enhances account security by requiring a second authentication method to verify your identity when your access your IBM Verify account on a computer or mobile device.
Before You Begin
To use the IBM Verify mobile app as an authenticator, download and install it from the App Store or Google Play.
If your application or security policies require 2FA, you must register at least one instance of the IBM Verify mobile authenticator app to enable it as a 2FA option during authentication.
Adding an authentication method
You can add a new authentication method, such as the IBM Verify app, another authenticator app, passkey, text messaging, email, or phone call, to enable two-step verification for your account.
Procedure
Adding the IBM Verify app
Register the IBM Verify app as an authenticator for two-step verification.
Procedure
Adding another authenticator app
Set up a third-party authenticator app for two-step verification. You can have one
Authenticator app only. If the IBM Verify
app is already registered as an authenticator app, you must remove it first by selecting the more
options menu () and clicking Remove
authenticator.
Procedure
Setting up a passkey
Configure a passkey by using your device's built-in authentication methods, such as biometrics or PIN.
Procedure
Setting up text messaging
Configure text messaging as an authentication method for receiving one-time passcodes.
Procedure
- Click New number.
- Select the correct country code.
-
Enter your mobile phone number without spaces. For example, enter (123) 456-7890 as 1234567890.
- Click Send access code.
- Enter the access code that you received on your mobile device.
- Click .
Setting up email authentication
Configure an email address to receive one-time passcodes for two-step verification.
Procedure
- Click New email.
-
Enter the email address in the correct format. For example,
johndoe@myco.com. Include the at symbol '@' and period '.' in the address. - Click Send access code.
- Enter the access code that you received in the email.
- Click .
Setting up phone call authentication
Configure a phone number to receive verbal access codes for two-step verification.
Procedure
- Click New number.
- Select the correct country code.
-
Enter your phone number without spaces. For example, enter (123) 456-7890 as 1234567890.
- Click Call me.
- Enter the access code that you received verbally on your phone.
- Click .
Removing an authentication method
If you no longer want to use an authentication method, you can remove it from your device.
About this task
- If you are within the grace period, after the removal you might see notifications about the required number of enrollments.
- If you are not within the grace period, after the removal you must complete the required number of enrollments the next time you authenticate.
Procedure
-
Hover over the authenticator and click the more options menu icon (
).
- Click Remove authenticator and click confirm.
Testing an authentication method
To test the operation of an authenticator, do the following steps.
Procedure
-
Hover over the authenticator and click the more options menu icon (
).
- Click Test Device and follow the instructions.
-
Respond to the push notification or enter the code that is delivered to your
authenticator. A push notification or code is delivered to your IBM Verify authenticator. Respond to the notification as directed.
Managing security questions
If the security questions feature is enabled for your tenant, you can answer the questions as a multi-factor authentication option.
About this task
Security questions are an older authentication method and are not as secure as other authentication factors. This feature is provided to accommodate the existing requirements of some customers. If you must use security questions, contact your tenant orchestration administrator to enable the security questions feature on your tenant.
Procedure
Managing your MDM devices
You can view, and delete your devices that are registered to access IBM Verify.
About this task
Devices must be registered through Microsoft Intune or Jamf.
When you delete a device from IBM Verify, it is not deleted from the device manager.