Enhancing Security with Two-Factor Authentication in Funding & Tenders Portal

 
F
u
n
d
i
n
g
 
&
 
T
e
n
d
e
r
s
 
P
o
r
t
a
l
T
w
o
-
f
a
c
t
o
r
 
a
u
t
h
e
n
t
i
c
a
t
i
o
n
 
Peter Härtwich
 
European Commission DG R&I  Business Processes –
RTD H3
 
2-factor authentication – why?
 
P
op-up at each log-in
 
Your EULogin account - basics
 
 
One EULogin account = one user
(natural person)
Do not share your credentials
(login,password) with others
Inform the Commission immediately
in case of theft or loss of your
credentials
 
F&T Portal 
Terms of Use
 
Possible methods to use the 2-factor authentication:
1.
Register a mobile device – EU Login app
2.
Register a mobile phone number
3.
Register a security key / trusted platform
4.
eID authentication
O
n
c
e
 
e
n
a
b
l
e
d
,
 
e
a
c
h
 
t
i
m
e
 
y
o
u
 
l
o
g
 
i
n
 
y
o
u
 
w
i
l
l
 
b
e
 
p
r
o
m
p
t
e
d
 
f
o
r
 
u
s
e
r
n
a
m
e
 
a
n
d
p
a
s
s
w
o
r
d
 
p
l
u
s
 
a
 
s
e
c
o
n
d
 
f
a
c
t
o
r
 
v
i
a
 
y
o
u
r
 
s
e
l
e
c
t
e
d
 
m
e
t
h
o
d
See 
IT How To
 and 
video
 for detailed guidance
 
2-factor authentication – how?
 
1.
Mobile device with EULogin app:
Any device allowing the installation of an app (Android, iOS) and
Internet access, no need for a mobile phone number/SIM card
QR code scanning at each login
2.
Mobile phone with SMS:
 
simple mobile phone sufficient (no smartphone needed)
Mobile phone number stored in your EULogin account is used
exclusively
 for the two-factor authentication, will not be disclosed
to anybody
See  
IT  How to  
and 
video
 
for detailed guidance
 
2-factor authentication – two recommended options
 
2-factor authentication – alternative options
 
(if a user does not have or does not want to use a mobile device)
 
USB security key
Trusted platform 
on your computer
eID
 (for users with national ID card
providing such function)
 
USB security key
 
A special USB device (to be purchased
from a company offering such
devices)
This security key has to be registered
with your EULogin account
At each login, the key has to be
plugged into your computer, providing
the second factor
Register a Security Key
Register a mobile phone
Register a Security Key
 
Register a Security Key
 
!
Y
o
u
 
w
i
l
l
 
s
e
e
 
a
 
p
o
p
-
u
p
 
w
i
n
d
o
w
 
c
o
n
f
i
r
m
i
n
g
t
h
a
t
 
t
h
e
 
s
e
c
u
r
i
t
y
 
k
e
y
 
w
i
l
l
 
b
e
 
u
s
e
d
 
t
o
a
u
t
h
e
n
t
i
c
a
t
e
 
f
o
r
 
E
U
 
L
o
g
i
n
 
(
w
i
t
h
 
t
h
e
 
e
m
a
i
l
a
d
d
r
e
s
s
 
o
f
 
y
o
u
r
 
E
U
 
L
o
g
i
n
 
a
c
c
o
u
n
t
)
.
I
f
 
y
o
u
 
h
a
v
e
 
n
o
t
 
i
n
s
e
r
t
e
d
 
t
h
e
 
k
e
y
 
y
e
t
,
i
n
s
e
r
t
 
i
t
 
n
o
w
 
b
e
f
o
r
e
 
c
l
i
c
k
i
n
g
 
O
K
.
Y
o
u
 
w
i
l
l
 
b
e
 
a
s
k
e
d
 
t
o
 
a
l
l
o
w
e
c
a
s
.
e
c
.
e
u
r
o
p
a
.
e
u
 
(
=
 
t
h
e
 
E
U
 
L
o
g
i
n
s
e
r
v
i
c
e
)
 
t
o
 
a
c
c
e
s
s
 
t
h
e
 
m
a
n
u
f
a
c
t
u
r
i
n
g
d
e
t
a
i
l
s
 
o
f
 
y
o
u
r
 
k
e
y
.
C
l
i
c
k
 
O
K
 
t
o
 
c
o
n
f
i
r
m
.
Register a Security Key
P
r
o
v
i
d
e
 
a
 
P
I
N
 
f
o
r
 
y
o
u
r
 
s
e
c
u
r
i
t
y
 
k
e
y
a
n
d
 
c
l
i
c
k
 
O
K
.
D
e
p
e
n
d
i
n
g
 
o
n
 
t
h
e
 
m
o
d
e
l
,
 
y
o
u
 
w
i
l
l
b
e
 
r
e
q
u
e
s
t
e
d
 
t
o
 
t
o
u
c
h
 
t
h
e
 
k
e
y
 
n
o
w
.
Y
o
u
r
 
s
e
c
u
r
i
t
y
 
k
e
y
 
i
s
 
n
o
w
 
r
e
g
i
s
t
e
r
e
d
Register a Security Key
Register a Trusted Platform
 
T
r
u
s
t
e
d
 
p
l
a
t
f
o
r
m
 
An option in the operating system of your
computer (most more recent
computers/notebooks have the required
hardware chip installed)
Works with Windows and Mac
Access to your computer/notebook must be
secured itself (biometric or password)
Device has to be registered with your EULogin
account
You can only log in to your EULogin account
from this computer/notebook
Register a Trusted Platform
Register a Trusted Platform
 
Y
o
u
r
 
t
r
u
s
t
e
d
 
p
l
a
t
f
o
r
m
 
i
s
 
n
o
w
 
r
e
g
i
s
t
e
r
e
d
4. eID authentication
 
U
s
e
 
y
o
u
r
 
n
a
t
i
o
n
a
l
 
I
D
 
e
C
a
r
d
 
a
s
 
s
e
c
o
n
d
 
f
a
c
t
o
r
 
(
i
f
 
e
q
u
i
p
p
e
d
 
f
o
r
 
t
h
i
s
;
 
c
u
r
r
e
n
t
l
y
o
n
l
y
 
p
o
s
s
i
b
l
e
 
f
o
r
 
1
6
 
m
e
m
b
e
r
 
s
t
a
t
e
s
)
T
h
e
 
p
r
o
c
e
s
s
 
t
o
 
c
o
n
f
i
r
m
 
t
h
e
 
r
e
g
i
s
t
r
a
t
i
o
n
 
o
r
 
l
o
g
i
n
 
h
a
p
p
e
n
s
 
i
n
 
t
h
e
 
c
o
u
n
t
r
y
-
s
p
e
c
i
f
i
c
 
w
e
b
s
i
t
e
 
o
r
 
w
i
t
h
 
t
h
e
 
s
p
e
c
i
f
i
c
 
e
I
D
 
s
o
l
u
t
i
o
n
 
o
f
 
y
o
u
r
 
c
o
u
n
t
r
y
.
 
P
l
e
a
s
e
 
r
e
f
e
r
t
o
 
y
o
u
r
 
c
o
u
n
t
r
y
 
e
I
D
 
s
u
p
p
o
r
t
 
f
o
r
 
g
u
i
d
a
n
c
e
 
o
n
 
t
h
e
 
s
p
e
c
i
f
i
c
 
s
t
e
p
s
 
t
o
 
f
o
l
l
o
w
.
The option usually implies using additional hardware (i.e. a card reader).
More information on eID: 
https://ec.europa.eu/digital-building-
blocks/wikis/display/DIGITAL/eID
 
4. eID authentication
 
Switch on the two-factor
authentication in the F&T
Portal
 
 
Confirmation of activation
 
Confirmation of activation
 
Login when two-factor
authentication is enabled
 
 
2-factor authentication at log in
 
IT Support in FTOP:
Two-factor authentication in the Funding & Tenders Portal - IT How To
 
More information
 
FAQs on two-factor authentication
 
EULogin accounts are strictly personal
 
F&T Portal 
Terms and Conditions
:
 
The identity and access management of the portal provides for all needed flexibility to make
sharing of accounts between users unnecessary. All roles in projects and organisations can
be equipped with back ups.
 
Still less than 1% of all users!
 
Thank you!
 
 
Grant agreement Art. 36
 
36.1 Forms and means of communication — Electronic management
EU grants are managed fully electronically through the EU Funding & Tenders Portal (‘Portal’). All
communications must be made electronically through the Portal, in accordance with the Portal Terms
and Conditions and using the forms and templates provided there (except if explicitly instructed
otherwise by the granting authority). Communications must be made in writing and clearly identify the
grant agreement (project number and acronym).
 
Communications must be made by persons authorised according to the Portal Terms and Conditions.
For naming the authorised persons, each beneficiary must have designated — before the signature of
this Agreement — a ‘legal entity appointed representative (LEAR)’. The role and tasks of the LEAR are
stipulated in their appointment letter (see Portal Terms
and Conditions)
 
F&T Portal 
Terms of Use
 
2.2.3 The means of access (i.e. the 
user name and password) are strictly personal 
and users are responsible
for safeguarding their confidentiality and security, and ensuring their appropriate use.
Users undertake to take all steps to prevent any unauthorised third party from gaining knowledge and making
use thereof
. Users may not transfer or sell their means of access to third parties. Users must notify the
European Commission immediately (via the IT helpdesk; see Support menu) of the loss, theft, breach of
confidentiality or any risk of misuse of the means of access.
Slide Note
Embed
Share

Increase in cybersecurity threats necessitates the use of two-factor authentication in the Funding & Tenders Portal to safeguard valuable information. Users are encouraged to adopt this secure login method, which will soon become mandatory. Methods such as mobile devices, SMS, and security keys are recommended to strengthen user authentication and prevent unauthorized access.

  • Security
  • Authentication
  • Two-factor
  • Funding portal
  • Cybersecurity

Uploaded on Mar 09, 2024 | 2 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Funding & Tenders Portal Two-factor authentication Peter H rtwich European Commission DG R&I Business Processes RTD H3

  2. 2-factor authentication why? Threats to cybersecurity increase continuously, affecting all systems managing data and information that might be interesting for intruders The Funding & Tenders Portal hosts a wealth of interesting information that might be under threat if users do not take the necessary measures (commercially sensitive data in proposals, project reports, deliverables; personal data ) Simple user name and password provide only a minimum level of protection against intruders Strongly encouraged for all users to start using it now will become mandatory

  3. Pop-up at each log-in

  4. Your EULogin account - basics One EULogin account = one user (natural person) Do not share your credentials (login,password) with others Inform the Commission immediately in case of theft or loss of your credentials F&T Portal Terms of Use

  5. 2-factor authentication how? Possible methods to use the 2-factor authentication: 1. Register a mobile device EU Login app 2. Register a mobile phone number 3. Register a security key / trusted platform 4. eID authentication Once enabled, each time you log in you will be prompted for username and password plus a second factor via your selected method See IT How To and video for detailed guidance

  6. 2-factor authentication two recommended options 1. Mobile device with EULogin app: Any device allowing the installation of an app (Android, iOS) and Internet access, no need for a mobile phone number/SIM card QR code scanning at each login 2. Mobile phone with SMS: simple mobile phone sufficient (no smartphone needed) Mobile phone number stored in your EULogin account is used exclusively for the two-factor authentication, will not be disclosed to anybody See IT How to and video for detailed guidance

  7. 2-factor authentication alternative options (if a user does not have or does not want to use a mobile device) USB security key Trusted platform on your computer eID (for users with national ID card providing such function)

  8. USB security key A special USB device (to be purchased from a company offering such devices) This security key has to be registered with your EULogin account At each login, the key has to be plugged into your computer, providing the second factor

  9. Register a Security Key

  10. Register a mobile phone

  11. Register a Security Key

  12. Register a Security Key !

  13. Register a Security Key You will see a pop-up window confirming that the security key will be used to authenticate for EU Login (with the email address of your EU Login account). You will be asked to allow ecas.ec.europa.eu (= the EU Login service) to access the manufacturing details of your key. If you have not inserted the key yet, insert it now before clicking OK. Click OK to confirm.

  14. Register a Security Key Provide a PIN for your security key and click OK. Depending on the model, you will be requested to touch the key now. Your security key is now registered

  15. Register a Trusted Platform

  16. Trusted platform An option in the operating system of your computer (most more recent computers/notebooks have the required hardware chip installed) Works with Windows and Mac Access to your computer/notebook must be secured itself (biometric or password) Device has to be registered with your EULogin account You can only log in to your EULogin account from this computer/notebook

  17. Register a Trusted Platform

  18. Register a Trusted Platform Your trusted platform is now registered

  19. 4. eID authentication

  20. 4. eID authentication Use your national ID eCard as second factor (if equipped for this; currently only possible for 16 member states) The process to confirm the registration or login happens in the country- specific website or with the specific eID solution of your country. Please refer to your country eID support for guidance on the specific steps to follow. The option usually implies using additional hardware (i.e. a card reader). More information on eID: https://ec.europa.eu/digital-building- blocks/wikis/display/DIGITAL/eID

  21. Switch on the two-factor authentication in the F&T Portal

  22. Confirmation of activation

  23. Confirmation of activation

  24. Login when two-factor authentication is enabled

  25. 2-factor authentication at log in

  26. More information IT Support in FTOP: Two-factor authentication in the Funding & Tenders Portal - IT How To

  27. FAQs on two-factor authentication

  28. Number of two-factor users 18000 16000 14000 12000 10000 8000 6000 4000 2000 0 Still less than 1% of all users!

  29. Thank you!

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#