Managing your IBM Verify authenticators
Authentication factors are used for two-step verification. Two-step verification protects you and your account by verifying your identity by using a second authentication method when you access your account on your computer.
Before you begin
Note: Your tenant administrator sets the authentication factors
that are available for you to
use.
About this task
If your application or Verify security policies require 2FA provided by IBM® Security Verify, then you first need to register one or more instances of theIBM Security Verify mobile authenticator app. If registered, IBM Security Verify can be offered as a 2FA option during runtime access and 'm seeing the IBauthentication.
You can perform the following tasks:
- Add an authenticator.
- View the authenticator details.
- Test the authenticator.
- Remove the authenticator.
Note: If your account requires a minimum number of enrollments, the enrollments must
be unique. For example, if you use the same phone number for text messages and phone calls, it is
only one enrollment. If you use your cell phone number for text messages and your office phone
number for phone calls, then they are two enrollments. Similarly, if your username and email address
are the same, it is one enrollment. However, if you list multiple email addresses, they are each an
enrollment. For example, johndoe@outlook.com, johndoe@gmail.com, johndoe@mycompany.com are three
unique enrollments.