Skip to main content

Cornell University

Students

Content (622)

Cornell has disabled the use of passcodes generated by the Duo Mobile App as an authentication method. Use one of the remaining authentication methods described below going forward.
With the Phone Callback method, Two-Step Login calls you on your mobile phone or landline. To authenticate:
Log In Using the Duo Mobile App Duo Push works with Duo Mobile, an app you install and activate on your smartphone or tablet. You can download Duo Mobile from your device’s app store.
You can grant others permission to see your calendar. You choose the level of detail (when you're free or busy, the subject of the event, or the details of the event). You also have the option of marking a calendar item as Private; this removes all privileges except seeing that you are busy for the…
I'm trying to use a hardware token but no passcode appears when I press the token's button. Solution: Either the battery is dead or the token is damaged. You will need to replace the token.
You can use Two-Step Login when you travel internationally to countries other than those listed below.  All of the authentication methods will still work, although some destinations might not support telephony-based services, such as phone callbacks or retrieving a set of passcodes via…
If Two-Step Login displays the message, Your account has been locked out due to excessive authentication failures. Please contact your administrator when you try to log in, then contact the IT Service Desk to unlock your Two-Step Login account.
User Experience I need to use Two-Step Login but I don’t have access to any of my enrolled devices or any passcodes. What should I do? Solution The IT Service Desk can issue an emergency bypass code that will allow you to log in up to ten times over the next twenty-four hours. To…
Remove the missing device immediately from Manage Your Two-Step Login using another device that you have enrolled. For details, follow the steps at Remove a Device from Two-Step Login.
Skype for Business has been replaced by Microsoft Teams. By default, Skype will start automatically when Windows starts. You can change this setting.
You will not be able to enable FileVault on a computer that is managed by Cornell IT staff, because encryption will already be setup.  If you are not sure whether your computer is managed, please contact your support provider. To enable FileVault on a non-managed Mac computer,…
Two-Step Login blocks criminals from using stolen Cornell passwords by requiring something they don’t have. Something in your possession. When it’s time to sign in using Two-Step Login, you confirm your identity by:
The following goals have been defined for these key areas of Cornell's Identity and Access Management program.
Finding someone in the Cornell Electronic Directory is very easy, since the search includes not only the name fields in the database, but department, nickname, NetID, and campus phone number as well. This means that as long as you know something about the person you're looking for, you will…
Available Licenses The following license upgrades are available. Please submit your request form (link below) at least five days in advance.
If while trying to log in to your Cornell Box account, just after authenticating, you are told you have "Invalid login credentials," this error can occur when: you've changed or ended your affiliation with Cornell and are no longer entitled to use the Box service through Cornell, OR your…
Information on Wired Networks for Students applies to only: 660 Stewart Prospect of Whitby  Triphammer Cooperative Von Cramm Hall Wait Ave Cooperative  Wait Terrace Wari Cooperative Watermargin All other student housing uses wireless networking. 
Please wait to contact the IT Service Desk during normal business hours (Monday-Friday, 8am-6pm) for any issues that are not emergencies.
Verify that CU VPN service is running at Status of CIT Services.
Join a List Customize Your Settings

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.