Use a Bypass Code

After you generate bypass codes, you can use them as a second method of verification when you forget your phone, don’t have service, or can’t access your computer.

  1. Enter your user name and password in an MFA-protected environment.
    The 2-Step Verification page appears, and then you are prompted for your second verification method.
  2. If you can’t use your usual second verification method (for example, because you don’t have your phone or you have no Internet connectivity), click Show alternative login methods to use an alternative method to verify your identity.
  3. In the Alternative login methods section of the page, click Use a bypass code.

    Note:

    You must have previously set up more than one verification method, such as using a bypass code that you previously generated and stored in a safe place. If you haven’t set up more than one verification method, you can call the help desk and have a bypass code generated for you.
  4. Enter your code in the Bypass code box.
    If you can't locate your bypass code, contact the help desk to have an administrator generate a bypass code for you.
  5. (Optional) Select the Trust this computer for _ days check box (if enabled by your administrator) to skip providing a second method of authentication for the number of days indicated when you log in from the same device. The number of days is defined by your administrator.
  6. Click Verify.