Skip to content Skip to main navigation Skip to footer

Multifactor Authentication (MFA)

PT

Multi-factor authentication (MFA) is an electronic authentication method in which users confirm their identity by presenting two or more pieces of evidence successfully. In ISCTE we consider your username and password to be the first factor of authentication. 

We recommend the OKTA Verify application as a second authentication factor:

Set up the Okta Verify app (Preferred)

  1. Go to https://login.iscte-iul.pt.
    In the top right corner, click on the downward pointing arrow and then on “Settings“.

  2. If you prefer to use the OKTA Verify app, in the “Security Methods” field, click on “Set up” placed in front of “Okta Verify.

  3. Fill in your ISCTE password.

  4. After filling in your password, click on Set up as in the image below.

  5. A QR code will be displayed.



  6. Install in your smartphone the Okta Verify app from the Google Play store/App Store.
    When you open the app, you will see the screen on the right. Click on “Add account”.

         

  7. Choose organization as the account type. When the app asks if you want to “Add Account from another device”, click “Skip“.

         

  8. Then click on “Yes, Ready to Scan” and scan the QR code shown to you on the OKTA website (see paragraph 5).

     

  9. After scanning the code, confirmation should appear that the account has been added to Okta Verify.
    Click on “Verify”.

  10. From now on, you can use multi-factor authentication via push notification on your device or using temporary 6-digit codes that appear in the app (see image below).

Other methods (not recommended)

As an alternative to the application recommended by our service (Okta Verify), you can also choose among:

  1. Go to https://login.iscte-iul.pt.
    In the top right corner, click on the downward pointing arrow and then on “Settings“.

  2. If you prefer to use Google Authenticator or similar applications*, in the “Security Methods” field, click on “Set up” placed in front of “Google Authenticator.


    * For similar TOTP (time-based one-time password) or authenticator apps, you should always select the Google Authenticator option.

  3. Fill in your ISCTE password.

  4. After filling in your password, click on Set up as in the image below.

  5. A QR code will be displayed.

    If you can’t scan the QR code and use another type of TOTP application, click on “Can’t scan?” and use the code that appears on the next page.

  6. Install the Google Authenticator application or similar on your mobile phone from the Google Play store/App Store.
    When you open the application you will see the screen on the right and click on “Add a code”.

         

  7. Then click on “Scan a QR code” and scan the QR code shown to you on the OKTA website (see paragraph 5).

         

  8. After scanning the QR code, your login.iscte-iul.pt account will appear in the mobile application with an associated temporary code.

  9. On the website (see paragraph 5), click on “Next”.

  10. From now on, you can use multi-factor authentication on your device using temporary 6-digit codes that appear in the app.
    The configuration is finished and you will be redirected to the login.iscte-iul.pt page.
  1. If you prefer to use the Security Key FIDO/U2F, go to https://login.iscte-iul.pt.
    In the top right corner, click on the downward pointing arrow and then on “Settings“.

  2. Click on “Set up” under “Security methods“, in front of “Security key or biometric authenticator”.

  3. Fill in your Iscte password.

  4. After entering your password, click on “Set up” as in the image below.

  5. When choosing the type of configuration, press “Set up“.

  6. Click “OK” to configure the security key for authentication.

  7. Click “OK” again to allow the key to be identified.

  8. Insert the security key into the USB port of your computer.

  9. When the key will be detected by the system, you will need to create a PIN to use with the security key.

  10. After that, you should place your finger on the security key’s button.

  11. Once the security key is configured, access GlobalProtect and in the “Welcome to Global Protect” window, in the “Please enter your portal address” field, write “vpn.iscte-iul.pt” and click on “Connect”, to establish the connection.

  12. A new window will open in the default browser where you will be asked to verify your Iscte account.
    After that, you should authenticate with the security key, following the instructions to complete the authentication.

  13. Once authentication is complete, a new GlobalProtect tab will be displayed in the browser to establish the connection to the VPN (you can find more information on our “VPN – Virtual Private Network” webpage in the “How to install/setup VPN?” section).
  1. Go to https://login.iscte-iul.pt.
    In the top right corner, click on the downward pointing arrow and then on “Settings“.

  2. In the “Security Methods” field, click on “Set up” placed in front of Google Authenticator*

    *For TOTP (Time-Based One-Time Password) applications other than Okta Verify, you should always select the Google Authenticator option.

  3. Fill in your Iscte password.

  4. After filling in your password, click on Set up as in the image below.

               

  5. A QR code will be displayed. However, to make the process easier, we recommend selecting the “Can’t Scan?” option and using the code shown on the next page.

  6. Install a TOTP application/software on your device. When the download is complete, open and run the installation following the on-screen instructions.
    Below is an example of the OTP Manager application in the desktop version.
  7. Open the OTP Manager application and select “Add manually”.

  8. Enter the generated code/secret key shown on the Okta website (see point 5) and save the changes.

  9. Enter the 6-digit code that appears in the application on the Okta website and click on “Verify“.

  10. The configuration is finished and you will be redirected to login.iscte-iul.pt page.

 AppAndroidiOS

Okta Verify

9.0 or later

16.0 or later

Google Authenticator

5.0 or later

14.0 or later

OTP Auth

N/A

12.0 or later

LastPass Authenticator

9.0 or later

16.0 or later

Twilio Authy

6.0 or later

15.0 or later

Aegis

5.0 or later

N/A

Microsoft Authenticator

8.0 or later

15.0 or later

 Software DesktopWindowsmacOS Linux 

OTP Manager (Aftnet)

10 or laterN/AN/A
Step TwoN/A13.1 or laterN/A