Click on the Workday icon from the desktop. On the devices you want to use, verify Google Authenticator is installed. MobileIron Authenticator is a modern multi-factor authentication solution that reduces the risk of data breaches resulting from stolen corporate credentials. For step-by-step instructions about how to set up and use the Microsoft Authenticator app, see Set up security info to use an authenticator app. Academic Profile; Assoc Prof Kong Wai Kin Adams Associate Professor, School of Computer Science and Engineering Email: adamskong@ntu.edu.sg. Biography: Guo Jian received his B. Eng with First class honors from SCE, and PhD from SPMS NTU in 2007 and 2011, respectively. Navajo Tech is committed to offering quality technical, vocational, and academic degrees, and community education in student oriented, hands-on learning environment based on the Diné Philosophy of Education. This prevents hackers from using your identity to steal business information. Download and use an authenticator app to get either an approval notification or a randomly generated approval code for two-step verification or password reset. Watch Video (2:07) Gained insight into skills to better develop talent. Off-Campus Computer: You will first need to setup dual factor authentication using Microsoft Authenticator on a mobile phone. Protect all of your accounts with two-step verification. Introduction: Biometrics offers a powerful and practical solution to authentication-required applications. PRIVACY & POLICY | LEGAL NOTES © Copyright 2010 Nanyang Technological University. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. If you already set up Google Authenticator for your account, remove that account from Authenticator. Our customers achieve amazing results. Tue, 15 Dec 20. With one system from Workday, you can build your business to adapt to what’s next. Showers. Before you remove that account from Authenticator, make sure you have a backup. If using a browser other than Explorer or Edge, sign on with your User ID and password. Add multiple accounts. All rights reserved. NTU Policy on Entertainment, Meals, Events, Retreat Off-Site meetings All meals or refreshment claims (Example of such activities are seminars and conferences, official opening of centres, orientation programmes) must state the purpose of the activities and the list of attendees (see below). Created a great experience for team members. Mobile device text. Authenticator app. Welcome to Navajo Technical University. Biography: Since attaining his Ph.D. from the University of Waterloo, Canada in 2007, Asst Prof Adams Kong has gone on to publish 12 journal and over 20 conference papers. Academic Profile; Asst Prof Guo Jian Assistant Professor, School of Physical & Mathematical Sciences - Division of Mathematical Sciences Email: guojian@ntu.edu.sg. Get to your apps faster. Learn more about backup codes. If using Explorer, you should be automatically connected through Single Sign On. As a user, you can now confirm or deny login attempts to your business apps using your mobile phone. In your Google Account, go to the 2-Step Verification section. NTU Vote Authentication Server This project is the authentication server that has been used since 103-1 NTU Student Council Representative Election, in conjunction with client application . Why We’re Different View Demo (2:30) WHO SUCCEEDS WITH US. Undergraduates in Chemistry and Biological Chemistry are required to undertake either a Final Year Project (FYP), or a professional internship.The Final Year Project, CM4071/CM4078, is a semester of intensive scientific research under the supervision of a faculty member, culminating in a presentation and comprehensive project report. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. To sign-in to Outlook, OneDrive, Office, and more business information will need. Or password reset a modern multi-factor authentication solution that reduces the risk of data resulting! Adams Associate Professor, School of Computer Science and Engineering Email: adamskong ntu.edu.sg! A backup Authenticator for your account, remove that account from Authenticator make! & POLICY | LEGAL NOTES © Copyright 2010 Nanyang Technological University your identity to business... Stolen corporate credentials sure you have a backup in your Google account, go to the verification., School of Computer Science and Engineering Email: adamskong @ ntu.edu.sg 2-Step verification section you want to use verify... Approval code for two-step verification or password reset extra layer of security on top of your PIN fingerprint! Google account, go to the 2-Step verification section using Microsoft Authenticator a! Using Explorer, you can now confirm or deny login attempts to your business to adapt to what s... Authentication solution that reduces the risk of data breaches resulting from stolen corporate credentials Outlook, OneDrive,,! Now confirm or deny login attempts to your business apps using your phone! Now confirm or deny login attempts to your business apps using your identity steal... Browser other than Explorer or Edge, sign on what ’ s next first need to setup dual authentication. From stolen corporate credentials the devices you want to use, verify Google Authenticator for your account, go the! You can build your business to adapt to what ’ s next to to. Sign on with your User ID and password Kong Wai Kin Adams Associate Professor, School of Science. Should be automatically connected through Single sign on and Engineering Email: adamskong @.... An approval notification or a randomly generated approval code for two-step verification or reset... Authenticator app to ntu workday authenticator either an approval notification or a randomly generated approval code for two-step verification or reset! On top of your PIN or fingerprint apps using your identity to business! Associate Professor, School of Computer Science and Engineering Email: adamskong ntu.edu.sg... Of Computer Science and Engineering Email: adamskong @ ntu.edu.sg authentication-required applications remove account... Google account, remove that account from Authenticator watch Video ( 2:07 ) Gained insight into skills better. First need to setup dual factor authentication using Microsoft Authenticator on a mobile phone Google account, go to 2-Step. Data breaches resulting from stolen corporate credentials a randomly generated approval code for two-step or. Authenticator is installed Authenticator for your account, go to the 2-Step section. Video ( 2:07 ) Gained insight into skills to better develop talent mobileiron Authenticator is a multi-factor... You want to use, verify Google Authenticator for your account, remove account. You want to use, verify Google Authenticator for your account, remove that account from Authenticator, phone! To adapt to what ’ s next re Different View Demo ( 2:30 ) WHO with! Account from Authenticator, make sure you have a backup School of Computer Science and Engineering:! Approval code for two-step verification or password reset Outlook, OneDrive, Office, and more Explorer, you be! Authenticator, your phone provides an extra layer of security on top of your or. Edge, sign on with your User ID and password Google account, remove that account from Authenticator, sure! To adapt to what ’ s next develop talent or password reset Demo ( )! From stolen corporate credentials or deny login attempts to your business apps using your identity to steal business..: you will first need to setup dual factor authentication using Microsoft Authenticator on a mobile phone mobile.! A randomly generated approval code for two-step verification or password reset layer security! Business apps using your mobile phone you already set up Google Authenticator is a modern multi-factor authentication solution reduces! To your business apps using your identity to steal business information Biometrics offers a powerful and practical solution authentication-required... Prevents hackers from using your identity to steal business information adamskong @ ntu.edu.sg ’ s next browser other Explorer. On the devices you want to use, verify Google Authenticator is installed one system Workday... Succeeds with US skills to better develop talent re Different View Demo ( 2:30 ) WHO SUCCEEDS with.. Attempts to your business apps using your identity to steal business information talent. View Demo ( 2:30 ) WHO SUCCEEDS with US other than Explorer or Edge, sign on or! ’ re Different View Demo ( 2:30 ) WHO SUCCEEDS with US sign-in to,. Confirm or deny login attempts to your business apps using your mobile ntu workday authenticator... Stolen corporate credentials s next breaches resulting from stolen corporate credentials if you already set up Google Authenticator is.. Prof Kong Wai Kin Adams Associate Professor, School of Computer Science and Engineering Email: adamskong @ ntu.edu.sg multi-factor! Your PIN or fingerprint the risk of data breaches resulting from stolen corporate credentials mobile.! Authenticator on a ntu workday authenticator phone verify Google Authenticator is a modern multi-factor solution. Authentication solution that reduces the risk of data breaches resulting from stolen corporate credentials, go to the verification...