Managing your IBM Verify authenticators
Authentication factors are used for two-step verification. Two-step verification protects you and your account by using a second authentication method to verify your identity when you access your account on your computer or device.
Before you begin
About this task
If your application or Verify security policies require 2FA provided by IBM® Security Verify, then you must register one or more instances of the IBM Security Verify mobile authenticator app so that IBM Security Verify appears as a 2FA option during runtime access authentication.
- Add an authenticator.
- View the authenticator details.
Procedure
Removing an authentication method
If you no longer want to use an authentication method, you can remove it from your device.
About this task
- If you are within the grace period, after the removal you might see notifications about the required number of enrollments.
- If you are not within the grace period, after the removal you must complete the required number of enrollments the next time you authenticate.
Procedure
- Hover over the authenticator and click the more options menu icon when it appears.
- Click Remove authenticator and click Confirm.
Testing an authentication method
You can use this procedure to verify that an authentication method works correctly.
About this task
To test the operation of an authenticator, do the following steps.
Procedure
- Hover over the authenticator and click the more options menu icon when it appears.
- Click Test Device and follow the instructions. A push notification or code is delivered to your IBM Security Verify authenticator. Respond to the notification as directed.