Purdue to require Microsoft Multi-Factor Authentication for email

Starting this spring, ITaP is requiring all Purdue email accounts to use Microsoft Multi-Factor Authentication to protect University email.  

Microsoft MFA protects users by requiring a second form of authentication, in addition to your career account password, when signing into Office 365 applications (including Outlook email). Once implemented campus wide, MFA will greatly reduce the amount of spam and phishing attacks appearing in your inbox.  

ITaP will enroll all students in MFA by the end of the spring 2022 semester, using the following schedule:  

  • Panhellenic, Student Life Student Workers, Spring Admit were rolled out prior to the winter break.
  • Residential Housing students were rolled in in January 2022. 
  • Graduate students will be added throughout the month of February, with enrollments taking place on Feb. 8, 15 and 22. 
  • Junior and professional students will be added on March 1. 
  • Sophomores will be added on March 8. 
  • Freshmen will be added March 15. 
  • Seniors will be added on March 22 and March 29. 

On your enrollment date, you will receive an email with instructions on how to set up authentication. Users will then have two weeks to set up their authentication method. After the two-week period, anyone who has not set up an authentication method will be unable to access their email until MFA setup has been completed.  

For most users, setup takes less than 5 minutes. Unlike BoilerKey, Purdue only requires users to log in using their MFA credentials once every 90 days. Users who sign out of their Microsoft account, clear their browser cache, or log in from a new device will also be prompted to use MFA when signing in again. 

At any time, you may voluntarily sign up for MFA by visiting itap.purdue.edu/mfa and following the instructions there. This page also contains additional information to help you navigate the process.