• No results found

Registration for My Profile & Administration

N/A
N/A
Protected

Academic year: 2021

Share "Registration for My Profile & Administration"

Copied!
24
0
0

Loading.... (view fulltext now)

Full text

(1)

Registration for

My Profile & Administration

(2)
(3)

Table Of Contents

User Registration ... 1 

Registering as a New User ... 1 

About the IDcipherTM Card ... 7 

How Do I Get An IDcipher TM Card? ... 8 

Two-Factor Authentication... 9 

New Division Registration ... 11 

Registering as a New Division ... 11 

New Top-Level Organization... 17 

(4)

User Registration

Registering as a New User

Complete the following steps to register for a user ID and Password, when you have received an email invitation to do so.

1. Click on the link in the invitation email you received to launch the registration wizard. The Enter

User Information screen is displayed.

2. Key in all fields as required. Be sure that:

o the mobile number you listed is enabled to receive SMS text messages if your organization allows text messages as second-factor authorization for log in, if your organization requires this authentication type.

o you are able to access the email address you listed. All password resets, confirmations, etc are sent directly to this email.

(5)

click Show Password Rules and review before attempting to create a password.

the challenge question you select will be used later to confirm your identity should you need to reset your password, retrieve your user ID, call the Help Desk, etc.

when you provide the answer in the challenge answer field, note that this is a case-sensitive field. Later, when you are prompted with the challenge question, you must be able to give the challenge answer exactly as you have provided it in this field (case and space sensitive).

4. Key in all fields as required, then click Continue Registration.

5. If the Select Service Package screen is displayed, enable the checkbox of each application you wish request then click continue. If it is not displayed, proceed to the next step.

6. If the Configure Two Factor Authorization screen is displayed, continue to step 7. If it is not,

(6)

7. Select one of the following (not all options are available to all customers):

If You Wish To: Then...

receive an SMS (text message) as the second factor authentication required during log in

a. Enable the SMS radio button

b. Select the country in which your cell phone is registered. c. Enable the radio button next to Mobile Phone Number field. d. Key in your mobile number to which you will receive SMS text

messages required for log in.

e. Click Verify. The passcode is sent via text to your mobile phone number provided, and the Enter Passcode field is displayed.

f. Key in the passcode in the Enter Passcode field (retrieved from your mobile phone).

g. Click Validate and Continue. The Review Request and Submit screen is displayed. h. Proceed to step 8. receive a voice recording as the second factor authentication required during log in

a. Enable the Phone radio button

b. Select the country in which your cell phone is registered. c. Enable the radio button next to Phone Number field.

d. Key in your number to which you will receive voice recording.

e. Click Verify. Your phone will ring, and a voice recording will state your passcode, and the Enter Passcode field is displayed.

f. Key in the passcode in the Enter Passcode field (retrieved from voice recording on your phone).

g. Click Validate and Continue. The Review Request and Submit screen is displayed.

(7)

If You Wish To: Then... h. Proceed to step 8. receive a mobile push (AKA Smartphone Push)A mobile push (aka Smartphone push) is the push notification services offered by modern mobile platforms, such as iPhone's APNS and Android's C2DM, and can be used to provide a real-time challenge/respons e mechanism on a mobile device. Upon performing a sensitive transaction or login, the user will instantly receive a challenge pushed to their mobile phone, be

prompted with the full details of that transaction, and be able to respond to approve or deny that transaction by simply pressing a

a. Enable the Mobile Push radio button

b. Select the country in which your cell phone is registered. c. Key in your number to which you will receive the mobile push. d. Select the phone type from the drop down list.

e. Select one of the following, if you selected: o "landline" in step d, click Call Me button.

o "mobile" in step d, click Text Me button, or Call Me button, whichever you prefer. The passcode is sent via your selected method, and the Verify Code field is displayed.

f. Key in the code in the Verify Code field (retrieved from your phone). g. Click Verify.

h. Click continue.

i. Optionally, continue with installation, or click skip this step. j. Proceed to step 8.

(8)

If You Wish To: Then... button on their mobile phone. Smartphone push two-factor authentication has the capability to not only be more user-friendly, but also more secure as a mutually-authentication connection can be established to the phone over the data network. as the second factor authentication required during log in receive an email as the second factor authentication required during log in

a. Enable the E-mail radio button

b. Key in the email address to which you will receive the passcode. c. Click Resend Passcode. The passcode is sent via text to your email

address, and the Enter Passcode field is displayed.

d. Key in the passcode in the Enter Passcode field (retrieved from your email).

e. Click Validate and Continue. The Review Request and Submit screen is displayed.

f. Proceed to step 8.

use the IDCipher card as

your second factor

authentication during log in

a. Enable the IDCipher radio button.

b. Click Continue Registration. The Review Request and Submit screen is displayed.

(9)

If You Wish To: Then... c. Proceed to step 8.

8. Key in the reason for your User ID request in the request reason field.

9. Click Submit Registration. Your request has been submitted. If your organization uses

IDCipher as the second-factor authorization, your IDCipher Card will sent to the email address you provided during registration.

RESULTS:

You have successfully submitted a registration request as a new user.

(10)

About the IDcipherTM Card

The IDcipherTM

Card is a premium service, available for purchase by your organization.

The IDcipherTM

card provides two-factor authentication (something the user knows and something the user has) which is one form of authentication that may be used when two-factor authentication is required. The card provides a low-cost, easy-to-use, easy-to-deploy authentication mechanism that provides an extra level of assurance when a user is authenticated.

Covisint has trademarked the IDcipher™ Card.

(IDcipherTM

(11)

How Do I Get An IDcipher TM Card?

The IDcipherTM

card is used as a method for authentication that may optionally be used within Portals that require two-factor authentication.

The process for obtaining an IDCipherTM

Card is dependent upon your user status. Click on the link that best describes you:

I am an existing user, I can already log in to the portal, but I need a new IDcipherTM Card >>>

I am new to the portal, and not yet a registered user? (You have not yet registered for the portal) >>>

When you register for portal access, an IDcipherTM card will automatically be generated and emailed to you upon approval of your registration request if the portal you are requesting access to requires the IDcipherTM card for up-level authentication.

After submitting a registration request, users need not perform additional action to obtain an IDCipherTM card.

(IDcipherTM card is a premium service available for purchase by portal customers. Please contact your Covisint sales representative for details.)

(12)

Two-Factor Authentication

Two-factor authentication is an authentication process that prompts the user for an additional, stronger form of authentication than a user name and password, when a user attempts to gain access to a system resource that requires an additional level of protection. Additionally, the user may be prompted for up-level authentication based on specified criteria which can be derived from user provided information (e.g. a specific user name), system collected information (e.g. an unknown PC IP Address), as well as

transaction patterns (e.g. time of day or how frequently the user signs on).

Covisint provides two-factor authentication (something the user knows and something the user has) for your organization by any of the following methods:

o IDCipher Card - User is prompted to key in the code on his/her IDCipher Card Grid at time of login.

o SMS Text Messages - User is prompted to key in the code that the system sends to his/her mobile phone at time of login.

(13)

New Division Registration

Registering as a New Division

Complete the following steps to register as a new Division of the organization, when you have received an email invitation to do so.

Before you begin - Registering as a Division (with a top-level parent) implies that your

organization wishes to configure a delegated administration model. This option should only be selected based on instruction from members of your company. The New Organization/Division registration process requires that the registrant accept the Security Administrator role. Check with members of your Organization to ensure that you are the appropriate person to assume this role.

1. Click on the link in the invitation email you received to launch the registration wizard. 2. Key in all fields as required regarding your Division information, then click Continue

(14)

3. Key in all fields as required. Be sure that:

o the mobile number you listed is enabled to receive SMS text messages if your organization allows text messages as second-factor authorization for log in, if your organization requires this authentication type.

o you are able to access the email address you listed. All password resets, confirmations, etc are sent directly to this email.

4. Click Continue Registration. The User Sign On screen is displayed.

o click Show Password Rules and review before attempting to create a password.

o the challenge question you select will be used later to confirm your identity should you need to reset your password, retrieve your user ID, call the Help Desk, etc.

o when you provide the answer in the challenge answer field, note that this is a case-sensitive field. Later, when you are prompted with the challenge question, you must be able to give the challenge answer exactly as you have provided it in this field (case and space sensitive).

5. Key in all fields as required, then click Continue Registration.

6. If the Select Service Package screen is displayed, enable the checkbox of each application you wish to request then click continue. If it is not displayed, proceed to the next step.

7. If the Configure Two Factor Authorization screen is displayed, continue to step 8. If it is not,

(15)

8. Select one of the following (not all options are available to all customers):

If You Wish To: Then...

receive an SMS (text message) as the second factor authentication required during log in

a. Enable the SMS radio button

b. Select the country in which your cell phone is registered. c. Enable the radio button next to Mobile Phone Number field. d. Key in your mobile number to which you will receive SMS text

messages required for log in.

e. Click Verify. The passcode is sent via text to your mobile phone number provided, and the Enter Passcode field is displayed.

f. Key in the passcode in the Enter Passcode field (retrieved from your mobile phone).

g. Click Validate and Continue. The Review Request and Submit screen is displayed.

(16)

If You Wish To: Then...

receive a voice recording as the second factor authentication required during log in

a. Enable the Phone radio button

b. Select the country in which your cell phone is registered. c. Enable the radio button next to Phone Number field.

d. Key in your number to which you will receive voice recording. e. Click Verify. Your phone will ring, and a voice recording will state

your passcode, and the Enter Passcode field is displayed.

f. Key in the passcode in the Enter Passcode field (retrieved from voice recording on your phone).

g. Click Validate and Continue. The Review Request and Submit screen is displayed.

h. Proceed to step 9.

receive a mobile

push (AKA

Smartphone Push)A mobile push (aka Smartphone push) is the push notification services offered by modern mobile platforms, such as iPhone's APNS and Android's C2DM, and can be used to provide a real-time challenge/response mechanism on a mobile device. Upon performing a sensitive transaction or login, the user will instantly receive a challenge pushed to their mobile phone, be

prompted with the

a. Enable the Mobile Push radio button

b. Select the country in which your cell phone is registered. c. Key in your number to which you will receive the mobile push. d. Select the phone type from the drop down list.

e. Select one of the following, if you selected: o "landline" in step d, click Call Me button.

o "mobile" in step d, click Text Me button, or Call Me button, whichever you prefer. The passcode is sent via your selected method, and the Verify Code field is displayed.

f. Key in the code in the Verify Code field (retrieved from your phone). g. Click Verify.

h. Click continue.

i. Optionally, continue with installation, or click skip this step. j. Proceed to step 9.

(17)

If You Wish To: Then...

full details of that transaction, and be able to respond to approve or deny that transaction by simply pressing a button on their mobile phone. Smartphone push two-factor authentication has the capability to not only be more user-friendly, but also more secure as a mutually-authentication connection can be established to the phone over the data network. as the second factor authentication required during log in

receive an email as the second factor authentication required during log in

a. Enable the E-mail radio button

b. Key in the email address to which you will receive the passcode. c. Click Resend Passcode. The passcode is sent via text to your email

address, and the Enter Passcode field is displayed.

d. Key in the passcode in the Enter Passcode field (retrieved from your email).

e. Click Validate and Continue. The Review Request and Submit screen is displayed.

(18)

If You Wish To: Then...

use the IDCipher card as

your second factor authentication during log in

a. Enable the IDCipher radio button.

b. Click Continue Registration. The Review Request and Submit screen is displayed.

c. Proceed to step 9.

9. Key in the reason for your User ID request in the request reason field.

10. Click Submit Registration. Your request has been submitted. If you chose IDCipher as your second-factor authorization, your IDCipher Card will sent to the email address you provided during registration.

RESULTS:

You have successfully submitted a registration request as a Security Administrator for a new Division.

(19)

New Top-Level Organization

Registering as a New Top Level Organization

Complete the following steps to register as a new Top-Level Organization when you have received an email invitation to do so.

Before you begin - Registering as a Top-Level Organization requires that the

registrant accept the Security Administrator role. Check with members of your Organization to ensure that you are the appropriate person to assume this role.

1. Click on the link in the invitation email you received to launch the registration wizard. The Enter Organization Information screen is displayed.

2. Key in all fields as required regarding your Organization information, then click Continue

Registration. The Enter User Information screen is displayed.

3. Key in all fields as required. Be sure that:

o the mobile number you listed is enabled to receive SMS text messages if your organization allows text messages as second-factor authorization for log in, if your organization requires this authentication type.

o you are able to access the email address you listed. All password resets, confirmations, etc are sent directly to this email.

(20)

4. Click Continue Registration. The User Sign On screen is displayed.

click Show Password Rules and review before attempting to create a password.

in this step, you will either create a challenge question, or select one from a list, depending on your organization's configuration. The question you create/select will be used later to confirm your identity should you need to reset your password, retrieve your user ID, call the Help Desk, etc.

when you provide the answer in the challenge answer field, note that this is a case-sensitive field. Later, when you are prompted with the challenge question, you must be able to give the challenge answer exactly as you have provided it in this field (case and space sensitive).

5. Key in all fields as required, then click Continue Registration.

6. If the Select Service Package screen is displayed, enable the checkbox of each application you wish to request then click continue. If it is not displayed, proceed to the next step.

7. If the Configure Two Factor Authorization screen is displayed, continue to step 8. If it is not,

(21)

8. Select one of the following (not all options are available to all customers):

If You Wish To: Then...

receive an SMS (text message) as the second factor authentication required during log in

a. Enable the SMS radio button

b. Select the country in which your cell phone is registered. c. Enable the radio button next to Mobile Phone Number field. d. Key in your mobile number to which you will receive SMS text

messages required for log in.

e. Click Verify. The passcode is sent via text to your mobile phone number provided, and the Enter Passcode field is displayed.

f. Key in the passcode in the Enter Passcode field (retrieved from your mobile phone).

g. Click Validate and Continue. The Review Request and Submit screen is displayed. h. Proceed to step 9. receive a voice recording as the second factor authentication required during log in

a. Enable the Phone radio button

b. Select the country in which your cell phone is registered. c. Enable the radio button next to Phone Number field.

d. Key in your number to which you will receive voice recording.

e. Click Verify. Your phone will ring, and a voice recording will state your passcode, and the Enter Passcode field is displayed.

f. Key in the passcode in the Enter Passcode field (retrieved from voice recording on your phone).

g. Click Validate and Continue. The Review Request and Submit screen is displayed.

(22)

If You Wish To: Then... h. Proceed to step 9. receive a mobile push (AKA Smartphone Push)A mobile push (aka Smartphone push) is the push notification services offered by modern mobile platforms, such as iPhone's APNS and Android's C2DM, and can be used to provide a real-time challenge/respons e mechanism on a mobile device. Upon performing a sensitive transaction or login, the user will instantly receive a challenge pushed to their mobile phone, be

prompted with the full details of that transaction, and be able to respond to approve or deny that transaction by simply pressing a button on their mobile phone.

a. Enable the Mobile Push radio button

b. Select the country in which your cell phone is registered. c. Key in your number to which you will receive the mobile push. d. Select the phone type from the drop down list.

e. Select one of the following, if you selected: o "landline" in step d, click Call Me button.

o "mobile" in step d, click Text Me button, or Call Me button, whichever you prefer. The passcode is sent via your selected method, and the Verify Code field is displayed.

f. Key in the code in the Verify Code field (retrieved from your phone). g. Click Verify.

h. Click continue.

i. Optionally, continue with installation, or click skip this step. j. Proceed to step 9.

(23)

If You Wish To: Then...

Smartphone push two-factor

authentication has the capability to not only be more user-friendly, but also more secure as a mutually-authentication connection can be established to the phone over the data network. as the second factor authentication required during log in receive an email as the second factor authentication required during log in

a. Enable the E-mail radio button

b. Key in the email address to which you will receive the passcode. c. Click Resend Passcode. The passcode is sent via text to your email

address, and the Enter Passcode field is displayed.

d. Key in the passcode in the Enter Passcode field (retrieved from your email).

e. Click Validate and Continue. The Review Request and Submit screen is displayed.

f. Proceed to step 9.

use the IDCipher card as

your second factor authentication during log in

a. Enable the IDCipher radio button.

b. Click Continue Registration. The Review Request and Submit screen is displayed.

(24)

If You Wish To: Then...

c. Proceed to step 9.

9. Key in the reason for your User ID request in the request reason field.

10. Click Submit Registration. Your request has been submitted. If you chose IDCipher as your second-factor authorization, your IDCipher Card will sent to the email address you provided during registration.

RESULTS:

You have successfully submitted a registration request as a Security Administrator for a new Top-Level Organization.

References

Related documents

– statements regarding our business plans, prospects, growth and operating strategies; – statements regarding the asset quality of our loan and investment portfolios; and –

• To access your Voice Mail from your home phone, dial your 10-digit phone number and enter your default passcode when prompted?. The default passcode will be the last four digits

At the Conference Center login screen, enter your Ready-Access phone number, 7-digit access code and Chairperson passcode and click Login button.. Select Manage Recordings from

When it's time for your conference, dial the toll-free conferencing phone number, listen to the prompts to enter your 7-digit access code, then enter your Chairperson passcode to

• When you have set or changed the Security passcode on your device, enter and save the same passcode on this Zaurus Manager screen.. Otherwise you will be asked for the

IF YOU OR YOUR AUTHORIZED USERS DISCLOSE YOUR PASSCODE TO ANYONE, AND/OR IF YOU ALLOW SOMEONE TO USE YOUR PASSCODE TO ACCESS YOUR ACCOUNTS, YOU ARE AUTHORIZING THEM TO ACT ON

IF YOU OR YOUR AUTHORIZED USERS DISCLOSE YOUR PASSCODE TO ANYONE, AND/OR IF YOU ALLOW SOMEONE TO USE YOUR PASSCODE TO ACCESS YOUR ACCOUNTS, YOU ARE AUTHORIZING THEM TO

Argosy University, Twin Cities’ PsyD in Clinical Psychology program is grounded in theory but also consists of experiential elements that allow the student to learn by