Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The Point Blue Science Cloud technology that powers the AKN has been developed to meet the federal standard for security, FedRAMP, in partnership with the U.S. Fish and Wildlife Service (USFWS). As our federal partners seek to increase security compliance across all systems that hold their data, we have updated our system to meet their security needs.

This particular update is related to “Phish “Phishing resistant multi-factor authentication” and is referenced in the Department of Interior memo, below

...

  1. You have access to at least one project within the U.S. Fish and Wildlife Service (USFWS) program

  2. You are not using an email address ending in “fws.org” to access the data

  3. You are not using an email address ending in “pointblue.org” to access the data

...

You can, however, be removed from all USFWS projects, which would also relieve your account from the login.gov requirement. Please speak directly to the project leader(s) for the projects you would like to be removed from to complete this process. Additionally, you can contact our support team and state that you would like to be removed from all USFWS projects by emailing us at: support@pointbluehelp.zendesk.com

Can I use my existing login.gov account?

...

  1. You will see a screen asking you to check your email for a confirmation message. Follow the instructions to continue.

...

  1. You will receive a an email message from login.gov prompting you to confirm your email address. Follow the instructions to proceed.

...

  1. Follow the instructions to validate your account’s two-factor authentication method.

    Note: This The way you’re asked to validate your account may be different, based on the authentication method you choose. The screenshot below shows the option for “Text or voice message”

...

  1. After successfully adding a two-factor authentication method to your account, you will see a success message. This page will give you the option to include additional two-factor authentication methods. This additional method can be use in the event that you lose access to your first method.

    For example, if you chose “Authentication app” as your first method, and “Backup codes” as your second method, you can use your backup codes to sign in if your phone is lost or stolen.

    This step is optional, but recommended, as you cannot login if you loose lose access to your primary two-factor authentication method.

...