Set Up Multifactor Authentication Methods

You use your password preferences to set up your preferred methods for authentication. After a method is set up, you can use it as a second factor of authentication for signing in.

Note: If your organization enables passwordless authentication, there's no option to sign in using a password. Instead, here's how it works:
  • Use your phone number or email as your username.
  • Rather than using a password, you will authenticate using multifactor authentication (MFA). So, before your organization implements passwordless authentication, you must have at least one MFA method set up.

Enroll in MFA and Set Up Your First Authentication Method

  1. Click your user image or name in the global header, and select Set Preferences from the Settings and Actions menu.
  2. Open your password preferences and click Manage Secure Verification.
  3. Enable secure verification using any of the available methods. You go through this guided setup process only when you're enrolling in MFA for the first time.
    Method Action Required
    Mobile App Use either of these modes.
    • Set up the Oracle Mobile Authenticator App to send a push notification for allowing or denying a sign in attempt.
    • Set up the Oracle Mobile Authenticator App to generate a passcode.
    Email Verify your email address using the one-time passcode that's mailed to you.
    Phone Number Verify using the one-time passcode that's sent to your phone number as a text message.
    FIDO Authenticator Set up and save a passkey from the available options.
    Note: Your work mobile number and work email are used for the Phone Number and Email methods. The number and email come from Oracle Fusion Cloud Applications, not Oracle Cloud Infrastructure.

Set Up Additional Methods and Manage Them

Right after you enroll in MFA, you can set up additional secure verification methods on the Security tab that opens in Oracle Cloud Console. Any time after enrollment, you can click the Manage Secure Verification link in your password preferences to return to the Security tab and set up additional secure verification methods or manage them.

Bypass codes are available as an additional authentication option. You can generate a bypass code and save it for later use, but you can use it only once. A bypass code comes in handy for you to sign in when your authenticator is unavailable for any reason like lost service or no service. You can also contact your administrator to get a bypass code.