Updating user policies please wait
After your login is accepted, you then must authenticate using a second factor.You must activate your administrator account for Duo Mobile separately from your user account to use Duo's push authentication See Managing Administrative Users for instructions.Administrators may use the Settings page in the Duo Admin Panel to customize account branding and second factor features.To access these features, log in to the Duo Admin Panel and click Settings in the left sidebar.You can prevent users from using the app to generate one-time passcodes by unchecking the Duo Mobile passcodes authentication method.Universal 2nd Factor (or U2F) is an authentication standard from the FIDO alliance. U2F tokens require Chrome 41 and later or Opera 40 and later, and are compatible with Duo's browser-based applications that feature inline enrollment and authentication prompt.If all methods are deselected then only hardware token passcodes or bypass codes may be used authenticate.Note: Even if Duo Push is disabled, users will still be able to use Duo Mobile to generate a one-time passcode (much as they might with a hardware token).
To remove this statement from your authentication prompt, clear the Duo branding General settings option.
For example, you can uncheck the phone callback authentication method.
Phone call no longer appears as an option in the authentication prompt.
Duo MFA customers who see the top level Policy navigation item in their Admin Panel don't need to allow U2F on the Settings page; it's already allowed.
If you're on Duo's Duo Access or Duo Beyond plans, U2F usage is also already allowed.