U.S. Department of Education to Implement Two Factor Authentication for G5
Domenica Pappas
(17 Mar 2016 09:06 EST)
|
Re: U.S. Department of Education to Implement Two Factor Authentication for G5 Judy Bristow (17 Mar 2016 09:14 EST)
|
I absolutely agree and we will be providing office numbers as well since we do not provide cell phones to OSPA staff. -----Original Message----- From: Research Administration List [mailto:xxxxxx@lists.healthresearch.org] On Behalf Of Domenica Pappas Sent: Thursday, March 17, 2016 10:07 AM To: xxxxxx@lists.healthresearch.org Subject: [RESADM-L] U.S. Department of Education to Implement Two Factor Authentication for G5 Hello Colleagues, We will not provide personal cell numbers for authentication, only office numbers. It will probably add to the time of processing, but so be it. Domenica Domenica G. Pappas, CRA Director Sponsored Research and Programs President, Midwest Section Society of Research Administrators International Join us for our Meeting May 15-18, 2016 10 W. 35th Street, Suite 7D7-1 Chicago, IL 60616 Phone: 312-567-3987 Fax: 312-567-6980 Email: xxxxxx@iit.edu -----Original Message----- From: Research Administration List [mailto:xxxxxx@lists.healthresearch.org] On Behalf Of RESADM-L automatic digest system Sent: Wednesday, March 16, 2016 11:00 PM To: xxxxxx@lists.healthresearch.org Subject: RESADM-L Digest - 15 Mar 2016 to 16 Mar 2016 (#2016-64) There are 3 messages totaling 711 lines in this issue. Topics of the day: 1. U.S. Department of Education to Implement Two Factor Authentication for G5 Access (2) 2. software as capital equipment? ---------------------------------------------------------------------- Date: Wed, 16 Mar 2016 20:40:21 +0000 From: "McClure, Christine Lynn" <xxxxxx@PITT.EDU> Subject: U.S. Department of Education to Implement Two Factor Authentication for G5 Access All, We received the below notification regarding a new 2 factor authentication for every log-in to the G5. How are other institutions planning on handling this? All ideas are greatly appreciated! Thanks! Christine Christine L. McClure Associate Director for Grant Operations University of Pittsburgh Office of Research 123 University Place, B21 Pittsburgh, PA 15213 412-624-7400 www.research.pitt.edu<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.research.pitt.edu_&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=3uHe9xZg17T2VI5dO5hTbkkCh4hjnrUVhx-oek2g15E&e= > U.S. Department of Education to Implement Two Factor Authentication for G5 Access The U.S. Office of Management and Budget (OMB) has mandated that all federal agencies implement increased cybersecurity capabilities to prevent unauthorized access to government systems. In keeping with the OMB mandate, the U.S. Department of Education will be implementing a more secure means for users of the G5 GrantsAdministration System to gain access, referred to as two factor authentication. Soon, all G5 external users will be required to enter a second piece ofidentification in addition to their password when logging into the system. Two factor authentications (2FA) is a security process in which the user provides two means of identification from separate categories of credentials; one is typically something that you know, such as a password; and the other is something that you have, such as a security code you download from your mobile device.The combination of these two security factors makes it more difficult for someone to access government systems. Once both the first and second factors are validated,users are allowed into the system. G5 users are already required to enter a password when logging into the system. The second factor will be provided by a free application called Google Authenticator that G5 users download and register to their mobile devices. The device will then generate a unique code each time the user logs into G5. For users who do not own a mobile device, the code can be retrieved via a text message or a phone call. Two factor authentication will be rolled out to G5 users in groups, starting in mid-April 2016 and ending in June 2016. Specific details on how to download the Google application or use an alternative method of code retrieval will be provided to each user in an email shortly before their account is switched over to 2FA. In preparation for the 2FA switch, all G5 users will be encouraged to enter at least one phone number as well as provide two additional security answers on their G5 profile, starting March 14. When logging into G5 for the first time after this date, users can go to the 'My Profile' page where they can enter the additional data. For further information on the implementation of Two Factor Authentication for G5, you may contact the G5 Hotline at (888) 336-8930. Email secured by Check Point <br> ======================================================================<br> Instructions on how to use the RESADM-L Mailing List, including<br> subscription information and a web-searchable archive, are available<br> via our web site at https://urldefense.proofpoint.com/v2/url?u=http-3A__www.healthresearch.org&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=gkD6aPDSNrBUlqw4uJoz5sRGiLtQygv3tQou_JnR93c&e= (click on the<br> "LISTSERV" link in the upper right corner)<br> <br> A link directly to helpful tips: https://urldefense.proofpoint.com/v2/url?u=http-3A__tinyurl.com_resadm-2Dl-2Dhelp&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=Cq9U_9DF-_6kpmbINUUhAo3eSulkB1gY36XWsbwyefk&e= <br> ======================================================================<br> ------------------------------ Date: Wed, 16 Mar 2016 15:54:06 -0500 From: Lori Miller <xxxxxx@UNI.EDU> Subject: Re: U.S. Department of Education to Implement Two Factor Authentication for G5 Access I was required to use the 2 factor authentication on a different federal website. I had them call my desk phone and give me a code. I entered the code and then was able to log in (only to realize my password expired, so I had to start over again.....) Lori -- Lori Miller Post Award Support Services Coordinator Office of Research and Sponsored Programs 213 East Bartlett Hall Cedar Falls, IA 50614-0394 Phone: 319-273-4321 For deaf or hard-of-hearing use Relay 711 Fax: 319-273-2634 E-mail: xxxxxx@uni.edu On 3/16/2016 3:40 PM, McClure, Christine Lynn wrote: > > *All,* > > *We received the below notification regarding a new 2 factor > authentication for every log-in to the G5. How are other institutions > planning on handling this? All ideas are greatly appreciated!* > > *Thanks! > Christine* > > Christine L. McClure > > Associate Director for Grant Operations > > University of Pittsburgh > > Office of Research > > 123 University Place, B21 > > Pittsburgh, PA 15213 > > 412-624-7400 > > www.research.pitt.edu > <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.research.pitt > .edu_&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsW > RUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUd > WlNAOpj5NQaI&s=3uHe9xZg17T2VI5dO5hTbkkCh4hjnrUVhx-oek2g15E&e= > > > ** > > ** > > *U.S. Department of Education to Implement Two Factor Authentication > for G5 Access* > > The U.S. Office of Management and Budget (OMB) has mandated that all > federal agencies implement increased cybersecurity capabilities to > prevent unauthorized access to government systems. In keeping with the > OMB mandate, the U.S. Department of Education will be implementing a > more secure means for users of the G5 GrantsAdministration System to > gain access, referred to as two factor authentication. Soon, all G5 > external users will be required to enter a second piece > ofidentification in addition to their password when logging into the > system. > > Two factor authentications (2FA) is a security process in which the > user provides two means of identification from separate categories of > credentials; one is typically something that you know, such as a > password; and the other is something that you have, such as a security > code you download from your mobile device.The combination of these two > security factors makes it more difficult for someone to access > government systems. Once both the first and second factors are > validated,users are allowed into the system. > > G5 users are already required to enter a password when logging into > the system. The second factor will be provided by a free application > called Google Authenticator that G5 users download and register to > their mobile devices. The device will then generate a unique code each > time the user logs into G5. For users who do not own a mobile device, > the code can be retrieved via a text message or a phone call. > > Two factor authentication will be rolled out to G5 users in groups, > starting in mid-April 2016 and ending in June 2016. Specific details > on how to download the Google application or use an alternative method > of code retrieval will be provided to each user in an email shortly > before their account is switched over to 2FA. > > In preparation for the 2FA switch, all G5 users will be encouraged to > enter at least one phone number as well as provide two additional > security answers on their G5 profile, starting March 14. When logging > into G5 for the first time after this date, users can go to the 'My > Profile' page where they can enter the additional data. > > For further information on the implementation of Two Factor > Authentication for G5, you may contact the G5 Hotline at (888) 336-8930. > > > > Email secured by Check Point > > <br> > ====================================================================== > <br> Instructions on how to use the RESADM-L Mailing List, > including<br> subscription information and a web-searchable archive, > are available<br> via our web site at > https://urldefense.proofpoint.com/v2/url?u=http-3A__www.healthresearch > .org&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWR > UjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdW > lNAOpj5NQaI&s=gkD6aPDSNrBUlqw4uJoz5sRGiLtQygv3tQou_JnR93c&e= (click > on the<br> "LISTSERV" link in the upper right corner)<br> <br> A link > directly to helpful tips: > https://urldefense.proofpoint.com/v2/url?u=http-3A__tinyurl.com_resadm > -2Dl-2Dhelp&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_ > 0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK > 9E9NUdWlNAOpj5NQaI&s=Cq9U_9DF-_6kpmbINUUhAo3eSulkB1gY36XWsbwyefk&e= > <br> > <https://urldefense.proofpoint.com/v2/url?u=http-3A__tinyurl.com_resad > m-2Dl-2Dhelp-253Cbr-253E&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3 > AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SA > bwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=SMRC12EdtDjSDMV_GdUNieWQrz-OPmED7BMt > tdjzhjw&e= > > ====================================================================== > <br> Email secured by Check Point <br> ======================================================================<br> Instructions on how to use the RESADM-L Mailing List, including<br> subscription information and a web-searchable archive, are available<br> via our web site at https://urldefense.proofpoint.com/v2/url?u=http-3A__www.healthresearch.org&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=gkD6aPDSNrBUlqw4uJoz5sRGiLtQygv3tQou_JnR93c&e= (click on the<br> "LISTSERV" link in the upper right corner)<br> <br> A link directly to helpful tips: https://urldefense.proofpoint.com/v2/url?u=http-3A__tinyurl.com_resadm-2Dl-2Dhelp&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=Cq9U_9DF-_6kpmbINUUhAo3eSulkB1gY36XWsbwyefk&e= <br> ======================================================================<br> ------------------------------ Date: Wed, 16 Mar 2016 23:23:20 +0000 From: "dougm (Doug Mounce)" <xxxxxx@CRAB.ORG> Subject: software as capital equipment? Does anyone have strong opinions and/or policies about classifying software > $5K as capital equipment? I know we used to do that if we bought an instrument that included custom software, and we would sometimes add software to the tagged piece of machinery and call it equipment (like replacing a carburetor for performance compared to replacing worn-out tires), but nowadays with stand-alone licenses costing more than the hardware how do you classify the item? (I've always said that the ADP line on the SF424 is where you put software. And the Commandant of the Marine Corps called it ADPE back in 1987.) In any case, our organization only charges indirects on direct labor so this is more a question of category approval rather than cost or rate negotiations. Thanks! Doug Email secured by Check Point <br> ======================================================================<br> Instructions on how to use the RESADM-L Mailing List, including<br> subscription information and a web-searchable archive, are available<br> via our web site at https://urldefense.proofpoint.com/v2/url?u=http-3A__www.healthresearch.org&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=gkD6aPDSNrBUlqw4uJoz5sRGiLtQygv3tQou_JnR93c&e= (click on the<br> "LISTSERV" link in the upper right corner)<br> <br> A link directly to helpful tips: https://urldefense.proofpoint.com/v2/url?u=http-3A__tinyurl.com_resadm-2Dl-2Dhelp&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=Cq9U_9DF-_6kpmbINUUhAo3eSulkB1gY36XWsbwyefk&e= <br> ======================================================================<br> ------------------------------ End of RESADM-L Digest - 15 Mar 2016 to 16 Mar 2016 (#2016-64) ************************************************************** Email secured by Check Point <br> ======================================================================<br> Instructions on how to use the RESADM-L Mailing List, including<br> subscription information and a web-searchable archive, are available<br> via our web site at https://urldefense.proofpoint.com/v2/url?u=http-3A__www.healthresearch.org&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=gkD6aPDSNrBUlqw4uJoz5sRGiLtQygv3tQou_JnR93c&e= (click on the<br> "LISTSERV" link in the upper right corner)<br> <br> A link directly to helpful tips: https://urldefense.proofpoint.com/v2/url?u=http-3A__tinyurl.com_resadm-2Dl-2Dhelp&d=AwIBaQ&c=SgMrq23dbjbGX6e0ZsSHgEZX6A4IAf1SO3AJ2bNrHlk&r=_0x6VsWRUjcvtTyRkAAwcV6Ac6bsGNxNGlPM-Yt760c&m=UfgCc8xtR4SAbwbLn2Hg1VqMK9E9NUdWlNAOpj5NQaI&s=Cq9U_9DF-_6kpmbINUUhAo3eSulkB1gY36XWsbwyefk&e= <br> ======================================================================<br> <br> ======================================================================<br> Instructions on how to use the RESADM-L Mailing List, including<br> subscription information and a web-searchable archive, are available<br> via our web site at http://www.healthresearch.org (click on the<br> "LISTSERV" link in the upper right corner)<br> <br> A link directly to helpful tips: http://tinyurl.com/resadm-l-help<br> ======================================================================<br>