Body
Multifactor Authentication, MFA (or 2 step verification) is an additional step added to a login process to help verify you are really youThis means that when you log in to campus systems, you’ll be asked to verify your identity using a second step—like a mobile app or text message—alongside your password. These days, most people carry a mobile phone. Because it’s something you already have, it can serve as an additional factor in the login process to verify your identity.
We are moving to Microsoft Entra ID for our multifactor authentication (MFA) provider. Microsoft provides increased security, compatibility and decreases costs to MassArt. All MassArt accounts are required to use MFA and you will be automatically prompted to set up MFA the first time you sign in. The registration process only takes a few minutes and supports a range of options to enroll in MFA
In order to set up MFA you will need:
- Your MassArt NetID and password
- A secondary authentication factor (smartphone, desk phone, Yubikey or similar)
MassArt highly encourages individuals to register multiple MFA factors in case one becomes inaccessible. Microsoft Authenticator is our recommended primary authentication method and everyone is encouraged to add another authenticator app, SMS, voice or a hardware key
To add a second MFA factor, manage or update your MFA factors please visit https://mysignins.microsoft.com/security-info
First time setup instructions:
- Access the Microsoft MFA setup portal at https://aka.ms/mfasetup
- Sign in with your MassArt NetID and password
- You will see the MFA enrollment process start with a ‘Let’s keep your account secure’ message
- Click Next to begin the MFA setup process
- If you’ve already configured MFA on your account you are brought to the MFA management page where you can add other factors or make changes




Choose your preferred MFA method. Options include:
- Microsoft Authenticator app (recommended)
- TOTP authenticator apps (Google Authenticator, Authy, 1Password, etc)
- Phone verification (SMS Text message / Voice call)
- YubiKey or similar FIDO2 security keys
Microsoft Authenticator app
- Download the Microsoft Authenticator application for iOS or Android
- Add an account and scan the QR code when shown


TOTP authenticator apps
- Download TOTP application like Google Authenticator, Microsoft Authenticator, Authy, etc
- On the Microsoft Authenticator registration page click ‘I want to use a different authenticator app’
- Name your authenticator and you’re given a QR code to register with your TOTP application


Phone verification options (SMS & Voice)
- On the initial setup screen, click the ‘I want to set up a different method’ and select Phone
- Follow the prompts to enter your phone number and verify via text message or voice call


Yubikey or similar hardware token
- In order to use a Yubikey or other hardware token you must already have another authentication factor registered
- Access the Microsoft MFA setup portal at https://aka.ms/mfasetup
- Click ‘Update Info’ on the Security info tile
- Click Add sign-in method, choose Security key from the list, and click Add to proceed
- You can see specific instructions from Yubico here
- Microsoft requires a second form of authentication if you are using a Yubikey


Questions or issues?