Deakin MFA - What do I do if I've lost my phone or MFA device?


Table of Contents

If you don't have access to your MFA device, you can:

If you think your device is permanently lost or stolen, you should remove the device from MFA so that it can no longer be used to access your account, see the Remove an MFA device section below. Please contact the IT HELP to ensure the security of your account.

Obtain a temporary access pass

Temporary access passes are not intended to be used as a regular means to access your account. Temporary access codes enable you to sign-in to add another MFA method or device to your account, or if you forget your phone when you come on campus.

  1. Contact the IT HELP to obtain a temporary access pass.

  2. Write the code provided down, this can be used to sign into your account until the code expires.

  3. Next time you try to sign-in (until the temporary access pass expires or is deleted), you will be prompted to enter the code that was provided to you.

    Login TAP prompt.png

  4. If you have already added an additional MFA method, you can select Use your password instead to log-in using your password and the recently added MFA method. You will stop being prompted to enter a Temporary Access Pass during sign-in as soon as the Temporary Access Pass expires or you delete the Temporary Access Pass (see the Remove an MFA device section below).

Register another device for MFA

  1. Follow the steps in How do I register a new phone or device for MFA? (Microsoft Authenticator).

  2. Remove any old devices you are no longer using.

Remove an MFA device

You must have at least one usable MFA method registered on your account. If you remove the last usable MFA method from your account, the next time you sign-in, you will be prompted to configure a new MFA method. Leaving your account without any registered usable MFA methods will reduce the security of your account.

  1. Log in to https://deakin.edu.au/mfa-setup

  2. Identify the device in the list of sign-in methods. To help identify the specific device, the type of sign-in method (i.e., Microsoft Authenticator) and description (often the name of the phone), is usually provided in the table. Sometimes there is an arrow on the right of the table that can be expanded to show more information, such as the date the device was registered.

    MySecurityInfo auth methods.png

  3. Click Delete to the right of the device to be removed, in the list.

  4. Confirm by clicking OK.

  5. Submit an IT request for further assistance regarding lost or stolen devices and ensure the security of your account.