Typical Workflow for Managing 2–Step Verification

There are two ways to set up 2–Step Verification for your account, during 2–Step Verification enrollment or using the 2–Step Verification page from the Oracle Identity Cloud Service self-service console. Use the 2–Step Verification page to perform tasks such as enabling and disabling 2–Step Verification, setting up authentication methods, trusting a device, and generating bypass codes.

Task Description Additional Information

Enroll in 2–Step Verification for Your Account

Learn how to enroll in 2–Step Verification during 2–Step Verification enrollment and the authentication methods available to you.

Enroll in 2-Step Verification for Your Account

Add Backup Verification Methods

Learn how to add backup verification methods for your account when you enroll in 2–Step Verification.

Add Backup Verification Methods

Trust a Device

Learn how to trust a device when you enroll in 2–Step Verification.

Trust a Device

Set a Default Verification Method

Learn how to set a default verification method when you enroll in 2–Step Verification.

Set a Default Verification Method

Task Description Additional Information

Adding a 2–Step Verification Method

Learn how to add 2–Step Verification methods on the 2–Step Verification page and the authentication methods that are available to you.

Adding a 2-Step Verification Method from the Self-Service Console

Removing a 2–Step Verification Method

Learn how to remove 2–Step Verification methods on the 2–Step Verification page.

Removing a 2-Step Verification Method

Renaming a 2–Step Verification Method

Learn how to rename a 2–Step Verification method on the 2–Step Verification page.

Renaming a 2-Step Verification Method

Managing Security Questions

Learn how to set up and manage security questions on the 2–Step Verification page.

Managing Security Questions

Generating a Bypass Code

Learn how to generate bypass codes on the 2–Step Verification page.

Generating a Bypass Code

Using a Bypass Code

Learn how to use a bypass code.

Using a Bypass Code

Removing a Trusted Device

Learn how to remove a trusted device on the 2–Step Verification page.

Removing a Trusted Device