What if I don’t have a signal or wi-fi connection on my phone?
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help
Even in the absence of wifi and signal, you can still use the Microsoft Authenticator app to codes generate a "one-time passcode" which will grant you access to the service you are accessing.
Please view the screenshots below to see how generating a one-time passcode works:
When you receive the MFA prompt click “Sign in another way” as shown below.
![]() |
---|
Select “use a verification code from my mobile app” as shown below.
![]() |
---|
A box will appear to type in a number code as shown below.
![]() |
---|
On your phone, open the Microsoft Authenticator app as shown below.
![]() |
---|
On the device you are trying to access on, type the passcode into the login box (before the code expires, you can see how long you have on the count down timer) and click Verify.
If you have a mobile signal, but no internet, you can authenticate via SMS instead of using a push-notification. That is why entering your mobile number as a method of authentication in addition to the Authenticator App is important.
- To register your mobile number, visit https://aka.ms/mfasetup
- To change your method for authenticating or to opt for this type of authentication as default, visit https://aka.ms/mysecurityinfo
Please see our MFA Additional Guide for further help
For help with MFA, please contact IS Enquiries at help@strath.ac.uk
Click to return to MFA homepage.
- Student Experience & Enhancement Services
- Print Services
- Estates Services
- Finance Directorate
- Human Resources Directorate
- Procurement
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help