How do I register for MFA?
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help
What do you need to do?
MFA is active in the University so there are a few steps you must take to ensure you are able to authenticate and access your account:
- Register for MFA. Instructions for registration can be found below.
- For Android phones, navigate to the Playstore, for iOS phones, navigate to the App store. Then search for Microsoft Authenticator, Click Install.
- Open the Authenticator App.
- If you are prompted about Data Privacy, Click OK, then skip all steps until you have the option to add your first account.
- You have now installed the Authenticator app. You can now continue on to the MFA User Registraton
Registration
To use MFA, generally, you will need a mobile device which you can register and use as your 'second-factor' for logging in.
If you are using a smartphone, you should download the Microsoft Authenticator App. This is the easiest way to use MFA and the method Information Services recommends.
- The first step in the registration process is to visit https://aka.ms/mfasetup on your desktop. You will then be prompted to login. Enter your email and Click Next
- You will now be asked for credentials, Enter your password and click Sign in
- You will now be prompted to provide additional information, Click Next
- If you haven't installed the Microsoft authenticator app on your phone go back to the home screen and follow the guide. Otherwise, Click Next
- In the Authenticator App, Click ADD ACCOUNT
- In the Authenticator App, Choose Work or school account
- If you receive a permission prompt, Click Allow
- Once you have completed the above steps on the Authernticator App, in the MFA Wizard, Click Next.
- In the Authenticator App, Scan the QR Code. In the MFA Wizard, Click Next
- Click Approve on your phone screen
- Once the Notification is approved successfully, Click Next
- You have now set up the authenticator app as your second method of authentication. Click Done
- You will now be taken to your security info page. This is where you can setup additional methods of authentication. We recommend adding your mobile in case
- something happens to your authenticator app. Click Add Method
- From the dropdown, Select Phone and Click Add
- Enter your mobile phone number and Click Next
- You will now be sent a 6 digit code to your mobile, Enter it here and Click Next
- SMS should now be verified, Click Done
- You will now be taken back to security info. To change your default sign in method, Click Change
- From the dropdown, Select Microsoft Authenticator - notification and Click Confirm
- You have now registered your information for MFA
- Once you are registered for MFA, you can manage your authentication methods at https://aka.ms/mysecurityinfo
If you do not have a mobile device that can be used for MFA, please contact your IT helpdesk for support.
![]() |
---|
Please see our MFA Additional Guide for further help
For help with MFA, please contact IS Enquiries at help@strath.ac.uk
Click to return to MFA homepage.
- Student Experience & Enhancement Services
- Print Services
- Estates Services
- Finance Directorate
- Human Resources Directorate
- Procurement
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help