![]() ![]() Note: Each backup code can only be used one time. Once it is done, it gives you some backup codes. Select Copy to clipboard in order to save them, see the image as an example. Select Enable to finish this process, as shown in the image. See this image.ī) Scan QR code, select on Generate QR code, it that has to be scanned by Google Authenticator as shown in this image.Ĭ) Enable Two-Factor authenticator, open your authenticator application in your cellular phone and enter the verification code. Select Details on any of the cell phones to generate a QR code that redirects you to the download page. In the Settings section select Manage, in order to see a straightforward guide with three steps needed to enable this feature, as shown in the image.Ī) Download authenticator, which you can obtain for Android or iPhone that can run Google Authenticator. Navigate to My Account at the right top of the Secure Endpoint Console as in this image. In order to configure this, follow this procedure: This feature allows you to enforce the authentication with an external access request. In most cases, the cache is refreshed after 5 minutes. Note: When user permissions change some data is cached in Search results so a user is still able to see it for a period of time even though they no longer have access to a group. If you are an administrator, in order to change permissions or grant administrator privileges, you can navigate to Accounts > Users select the user account and choice the permissions, see this image.Īn administrator also can revoke administrator privileges to another administrator, to do this you can navigate to the administrator account to see the option, as shown in the image. Two-Factor Authentication provides an additional layer of security against unauthorized attempts to access your Secure Endpoint Console account. If you do not grant them those privileges, you can select which groups, policies and lists they have access to. When you create a new user account, you have the choice of whether to grant them administrator privileges. Note: An administrator can demote another administrator to a regular account but cannot demote themselves.Īn unprivileged or regular user account can only view information for groups they have been given access to. When you create a new username you must select their privilege level, but you can change their access level at any time.Īdministrators have full control, can view data from any group or computer in the organization and make changes to groups, policies, lists and usernames. ![]() ![]() There are two types of accounts in the Secure Endpoint Console: administrators and unprivileged or regular accounts. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on these software and hardware versions: Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: This document describes the type of accounts and the steps to configure Two-Factor Authentication in the Cisco Secure Endpoint Console. ![]()
0 Comments
Leave a Reply. |