This section explains how you can authenticate to your enterprise applications using different second factors. Akamai MFA supports all the authentication methods described below, but your organization can restrict the number of available options because of the company security policy. This means that you may not be able to use all these authentication methods to log in.
Contact your admin to confirm which authentication methods have been implemented by your organization.
After you enroll your trusted mobile device in the Akamai MFA service, you start using it to reply to authentication requests. At a high level, this challenge-response authentication process comprises the following steps that you have to perform before you can access the required enterprise application.
After you successfully complete the primary log-in process, the authentication prompt displays on your computer screen. In the authentication prompt, you can select your secondary verification method.
To obtain access to the required enterprise app, log in using the selected authentication method.
Updated 9 months ago