guide.duo.com
Open in
urlscan Pro
2607:f8b0:4006:807::2013
Public Scan
Submitted URL: https://url.us.m.mimecastprotect.com/s/2HlfCpYXYjfvv8lkhDhvSGcMX5
Effective URL: https://guide.duo.com/universal-enrollment
Submission: On January 16 via api from AE — Scanned from US
Effective URL: https://guide.duo.com/universal-enrollment
Submission: On January 16 via api from AE — Scanned from US
Form analysis
0 forms found in the DOMText Content
Guide to Two-Factor Authentication Show/hide navigation * Home * Duo Universal Prompt * Duo Universal Prompt Enrollment * Traditional Duo Prompt * Traditional Duo Prompt Enrollment * Add a New Device * My Settings & Devices * Software Update * Duo Desktop * Duo Passwordless * Duo Mobile * iOS * Apple Watch * Android * Duo Restore * Other Devices * Cell Phones & Landlines * Hardware Tokens * Security Keys * Touch ID * Authenticating * Duo Universal Prompt * Traditional Duo Prompt * Append Mode * Auto Mode * Challenge Mode * Duo Single Sign-On * Duo Central * Duo Access Gateway Launcher * DuoConnect * Duo Unix * Microsoft Windows Logon * macOS Logon * LastPass * Cisco AnyConnect * VMware View * Pulse VPN Client * Citrix Receiver * Other * Third-Party Accounts * Common Issues * Duo Knowledge Base * Visit duo.com DUO UNIVERSAL PROMPT Welcome to Duo's refreshed authentication experience, the Universal Prompt. This guide takes you through setting up your Duo authentication options in the Universal Prompt. Is your organization still using the traditional Duo Prompt? See the traditional Duo Prompt enrollment guide for more information and instructions. Researching Duo for your organization? Learn about Duo's multi-factor authentication (MFA) solutions. Contents * Supported Browsers * WebAuthn Supported Browsers * Language Support * First-time Enrollment in Duo * Step One: Introduction * Step Two: Choose Your Verification Method * Step Three: Add Your Chosen Method * Touch ID on Mac * Windows Hello * Face ID/Touch ID on iPhone or iPad * Android Biometrics * Duo Mobile * Security Key * Duo Desktop * Phone for Call or Text * Step Four: Add a Backup Method * Add or Manage Devices After Enrollment * Add Another Device * Rename or Remove a Device * Reactivate Duo Mobile for an Existing Device * Device Notifications * Log In With the Duo Universal Prompt * How to Get Help SUPPORTED BROWSERS The Universal Prompt supports Chrome (Desktop and Mobile), Firefox, Safari (Desktop and Mobile), Edge, and Internet Explorer. Not all browsers support all Duo authentication methods, so for the widest compatibility we recommend Chrome. Check the table below for supported browser versions and Duo login option compatibility. Platform and roaming authenticators may require a different browser or a newer minimum browser version; please refer to WebAuthn Browser Support. Duo's support for the minimum browser version includes Duo Push, passcode, and phone call authentication options. Browser Minimum Supported Version Chrome 38 Safari 9 Firefox 47 Edge 17 Internet Explorer 11 While other browsers may work with the Universal Prompt, Duo actively tests and supports the browsers and minimum versions listed in the table. When you log in Duo checks your current browser or client compatibility with the Universal Prompt. If your browser or client is not compatible, Duo will show you the traditional prompt experience instead. WEBAUTHN SUPPORTED BROWSERS Check the tables below for supported browser versions for platform authenticators (like Touch ID, Face ID, Windows Hello, or Android biometrics) and roaming authenticators (like security keys). While other browsers may work, Duo actively tests and supports the browser minimum versions listed in the tables. WINDOWS 10 AND LATER Browser Minimum Supported Version Platform Authenticator Roaming Authenticator (Security Keys) Edge 79 Yes 1 Yes Chrome 73 Yes 1 2 Yes Firefox 66 Yes Yes 1. Windows Hello is not supported in Chrome Incognito or Edge InPrivate browsing sessions. 2. Use of passkeys as platform authenticators requires Windows 11 and Chrome 108 or later. MACOS 11 AND LATER You must sign in with the same iCloud account and enable iCloud Keychain sync on all the Apple devices you plan to use with Duo and passkeys. See the iCloud documentation for instructions specific to your device types: * Mac * iPhone * iPad Browser Minimum Supported Version Platform Authenticator Roaming Authenticator (Security Keys) Safari 14 Yes 1 Yes Chrome 70 Yes 1 Yes Firefox 114 Yes 2 Yes 3 1. Use of passkeys as platform authenticators requires macOS 13 and Safari or Chrome 108. 2. Firefox 122 or later is required for platform authenticators. 3. For Duo Passwordless, Firefox on macOS cannot prompt to create a security key's PIN. Security keys that already have a PIN set can be used to authenticate in Firefox. IOS/IPADOS 14.5 AND LATER You must sign in with the same iCloud account and enable iCloud Keychain sync on all the Apple devices you plan to use with Duo and passkeys. See the iCloud documentation for instructions specific to your device types: * iPhone * iPad * Mac Browser Minimum Supported Version Platform Authenticator Roaming Authenticator (Security Keys) Safari 14.5 Yes 1 Yes Chrome 95 Yes 1 Yes Edge 95 Yes 1 Yes Firefox 68 Yes 1 Yes 1. Use of passkeys as platform authenticators requires iOS 16+ or iPadOS 16+. ANDROID 11 AND LATER Browser Minimum Supported Version Platform Authenticator Roaming Authenticator (Security Keys) Chrome 95 Yes 1 Yes 2 Firefox 68 Yes 3 No 4 1. Passkey support with Google Password Manager. 2. Chrome on Android 11 cannot prompt for the security key's PIN to fulfill the passwordless user verification requirement. 3. Firefox on Android 11 does not support Android biometric enrollment. 4. Firefox on Android cannot prompt for the security key's PIN to fulfill the passwordless user verification requirement. LINUX Linux has no supported platform authenticators. Browser Minimum Supported Version Platform Authenticator Roaming Authenticator (Security Keys) Chrome 73 No Yes Edge 79 No Yes Firefox 114 No Yes LANGUAGE SUPPORT Your browser's language settings determine the language shown in the Universal Prompt, with no extra configuration necessary. When the Universal Prompt displays English, Spanish, French, German, or Japanese, phone callback authentication will use the same language shown in the prompt. Catalan, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, Finnish, Hindi, Indonesian, Italian, Korean, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Swedish, Thai, Turkish, and Vietnamese languages will display in the Universal Prompt, but phone callback authentication will be in English. FIRST-TIME ENROLLMENT IN DUO Enrollment is the process that registers you as a user in Duo with a device capable of performing two-factor authentication. Duo prompts you to enroll the first time you log into a protected VPN or web application when using a browser or client application that shows the interactive Duo web-based prompt. Follow the on-screen prompts to set up your Duo authentication device. 0:36 Click for sound 0:36 Instead of enrolling when you log in to an application, you might receive an email from your organization's Duo administrator with an enrollment link instead. This emailed link takes you directly to the Duo enrollment portal. You'll see either the Universal Prompt experience shown on this page or enrollment in the traditional Duo prompt depending on your organization's email enrollment configuration. STEP ONE: INTRODUCTION Logging into a Duo-protected application enabled for self-enrollment takes you to the device management page to enroll. Click Next to learn why protecting your identity with two-step verification is important and begin the setup process. STEP TWO: CHOOSE YOUR VERIFICATION METHOD Choose the device type in the list that matches your desired authentication experience: * Touch ID: Use the fingerprint sensor on Apple MacBooks, Magic Keyboards, or iPhone. * Face ID: Use the face scanning feature on iPhone. * Windows Hello: Use your Windows Hello PIN, scan your fingerprint, or use facial recognition on Windows devices. * Device verification: Use Android Biometrics on Android devices. * Duo Mobile: Approve Duo Push verification requests on iOS or Android devices, or generate a one-time passcode from the Duo Mobile app. * Security key: Tap a WebAuthn/FIDO2 security key. Requires Chrome, Safari, Firefox, or Edge. * Phone number: Receive a one-time passcode in an SMS message or approve a login attempt with a phone call from Duo. Only your organization's Duo administrator or help desk can add hardware tokens and Yubikey OTP tokens for you. These verification options do not show up in the list of available options. Neither do any methods that your organization blocks from use; if your Duo administrator applied a policy that doesn't allow authentication with text messages or phone calls, the "Phone number" option will be missing when you enroll. Duo recommends the most secure option of the methods available to you, so it's a good idea to set up that method first if you have a device that supports it. This is an example of the options on a MacBook with Touch ID available: STEP THREE: ADD YOUR CHOSEN METHOD Once you choose how to verify your identity, you will next complete the setup steps for that method. TOUCH ID ON MAC In order to use Touch ID with Duo, make sure you have the following: * A MacBook Pro, MacBook Air, or Apple Magic Keyboard with a Touch ID button. * A fingerprint enrolled in Touch ID (see how to do this at the Apple Support site). * A supported browser: Safari or Chrome. Refer to the browser support table. * iCloud Keychain sync enabled on all the Apple devices you will use with Duo and the passkey you will create during setup. 1. Read the Touch ID information and click Continue. 2. Chrome prompts you to verify your identity on duosecurity.com. 3. Place your finger on the Touch ID button in the Touch Bar to complete Touch ID enrollment. 4. When you receive confirmation that you added Touch ID as a verification method, tap Continue. You can now log in to Duo-protected applications that show the Duo prompt in a web browser using your Touch ID fingerprint sensor. If your organization has enabled Duo Passwordless for Duo Single Sign-On applications then you'll automatically be able to use Touch ID for passwordless authentication after the first time you complete two-factor authentication with Touch ID during Duo Single Sign-On login. If you completed your Duo enrollment while logging in to Duo Single Sign-On then you will be able log in without a password the next time you access the application. If you have more than one MacBook with which you'd like to approve Duo login requests using Touch ID, you'll need to add each of them separately as a new Touch ID device in Duo. To do this, your organization must have enabled self-service device management. WINDOWS HELLO 1. Read the Windows Hello information and click or tap Continue. 2. Follow the Windows Hello instructions to verify your identity by entering your PIN, scanning your fingerprint, or pointing your face to your camera. 3. When you receive confirmation that you added Windows Hello as a verification method click or tap Continue. You can now log in to Duo-protected applications that show the Duo prompt in a web browser using Windows Hello. If your organization has enabled Duo Passwordless for Duo Single Sign-On applications then you'll automatically be able to use Windows Hello for passwordless authentication after the first time you complete two-factor authentication with Windows Hello during Duo Single Sign-On login. If you completed your Duo enrollment while logging in to Duo Single Sign-On then you will be able log in without a password the next time you access the application. FACE ID/TOUCH ID ON IPHONE OR IPAD In order to use Face ID or Touch ID on an iPhone or iPad with Duo, make sure you have the following: * An iPhone or iPad that supports Face ID or Touch ID. * Face ID or Touch ID already set up on the iPhone or iPad. Learn how to set up Face ID or set up Touch ID at the Apple Support site. * iCloud Keychain sync enabled on all the Apple devices you will use with Duo and the passkey you will create during setup. 1. Read the Face ID (or Touch ID) information and tap Continue. 2. Follow your device's instructions for scanning your face to complete Face ID verification or scan your fingerprint for Touch ID verification. 3. When you receive confirmation that you added Face ID as a verification method click Continue. You can now log in to Duo-protected applications that show the Duo prompt in a web browser using Face ID or Touch ID on an iPhone or iPad. If your organization has enabled Duo Passwordless for Duo Single Sign-On applications then you'll automatically be able to use Face ID or Touch ID for passwordless authentication after the first time you complete two-factor authentication with Face ID or Touch ID during Duo Single Sign-On login. If you completed your Duo enrollment while logging in to Duo Single Sign-On then you will be able log in without a password the next time you access the application. ANDROID BIOMETRICS 1. Read the device verification information and click or tap Continue. 2. Follow the Android instructions to verify your identity by scanning your fingerprint or pointing your face to your camera. If you aren't able to do either of those biometric checks, you can enter your Android PIN. 3. When you receive confirmation that you added your Android device as a verification method tap Continue. You can now log in to Duo-protected applications that show the Duo prompt in a web browser using Android biometrics. If your organization has enabled Duo Passwordless for Duo Single Sign-On applications then you'll automatically be able to use Android biometrics for passwordless authentication after the first time you complete two-factor authentication with Android biometrics during Duo Single Sign-On login. If you completed your Duo enrollment while logging in to Duo Single Sign-On then you will be able log in without a password the next time you access the application. DUO MOBILE Duo Mobile is an app that runs on iOS and Android phones and tablets. It's fast and easy to use, and doesn't require cell services. Duo pushes login requests to Duo Mobile when you have mobile data or wifi connectivity to the internet. When you have no data service, you can generate passcodes with Duo Mobile for logging in to applications. The current version of Duo Mobile supports iOS 15.0 or greater and Android 11 or greater. 1. Select your country from the drop-down list and type your mobile phone number, and then click Add phone number. If you're going to use Duo Mobile on a tablet (like an iPad) with no phone service, don't enter a phone number and click I have a tablet instead. 2. If you entered a phone number, double-check that you entered it correctly and click Yes, it's correct to continue (or No, I need to change it to go back and enter the number again). If the phone number you entered already exists in Duo as the authentication device for another user then you'll need to enter a code sent to that number by phone call or text message to confirm that you own it. Choose how you want to receive the code and enter it to complete verification and continue. 3. Download and install Duo Mobile on your phone or tablet from the Google Play Store or Apple App Store. Once you have Duo Mobile installed click Next. 4. Open the Duo Mobile app on your phone or tablet and add this account by scanning the QR code shown on-screen. If you aren't able to scan the QR code, tap Get an activation link instead and then enter your email address to send the activation link to yourself. Follow the instructions in the email to activate the new account in Duo Mobile. If you're on a mobile device, tap Open Duo Mobile to activate the new account in Duo Mobile. 5. When you receive confirmation that Duo Mobile was added click Continue. You can now log in to Duo-protected applications with Duo Push or with a Duo Mobile passcode. If your organization has enabled Duo Passwordless for Duo Single Sign-On applications then you'll automatically be able to use Duo Push for passwordless authentication after the first time you complete two-factor authentication with Duo Push during Duo Single Sign-On login. If you completed your Duo enrollment while logging in to Duo Single Sign-On then you will be able log in without a password the next time you access the application. SECURITY KEY A security key is an external device that when tapped or when the button is pressed sends a signed response back to Duo to validate your login. Duo uses the WebAuthn authentication standard to interact with your security keys. You may also see WebAuthn referred to as "FIDO2". To use a security key with Duo, make sure you have the following: * A supported security key. WebAuthn/FIDO2 security keys from Yubico or Feitian are good options. U2F-only security keys (like the Yubikey NEO-n) can't be used with the Universal Prompt. * If your organization requires user verification of your security key with a PIN or biometric then your security key must support FIDO2. * A supported browser: Chrome, Safari, Firefox, or Edge. Refer to the Universal Prompt browser support table for minimum browser versions with security key support in Duo. 1. Read the security key information and click Continue. 2. Follow the browser prompts to complete enrollment of your security key, allowing Duo to access information about your security key during setup (Windows example using Edge shown). 3. If your organization requires user verification and you have not already configured a PIN or biometric for your security key you will need to do that now (Chrome example shown). If you already set your PIN or configured biometrics for your security key then you'll need to enter your PIN or scan your biometric to complete setup. 4. When you receive confirmation that you added your security key as a verification method click Continue. You can now log in to Duo-protected applications that show the Duo prompt in a web browser using your security key. To use your security key with Duo Passwordless it must support user verification, such as requiring a PIN or fingerprint for use. DUO DESKTOP In order to use Duo Desktop for authentication, make sure you have the following: * Your device must be running macOS 11+ or Windows 10 build 1803+. * Duo Desktop 6.12.0+ installed on Windows or Duo Desktop 6.12.0.0+ installed on macOS. 1. Duo Desktop will pop up a confirmation window. Click Yes to link your account. On macOS: On Windows: 2. Click Continue to login. On macOS: On Windows: You can now log in to Duo-protected applications that show the Duo prompt in a web browser using Duo Desktop. If you switch between computers, your organization's Duo administrator may have enabled an option that automatically sets up Duo Desktop for authentication on different computers after you complete the setup steps once. PHONE FOR CALL OR TEXT This option is suitable for mobile phones that can't run Duo Mobile, or office phones and landlines. 1. Select your country from the drop-down list and type your phone number, and then click Add phone number. If this phone number is a landline and can't receive text messages, select the This is a landline phone option before continuing. 2. If you opted to add a landline, you can enter the landline's extension on the next screen and click Add extension or click Skip this step if you do not need to enter an extension for your landline. 3. Verify that the phone number shown (and landline extension, if you entered one) is accurate and click Yes, it's correct to continue (or No, I need to change it to go back and enter the number again). If the phone number you entered already exists in Duo as the authentication device for another user then you'll need to enter a code sent to that number by phone call or text message to confirm that you own it. Choose how you want to receive the code and enter it to complete verification and continue. 4. When you receive confirmation of adding the new mobile phone number for texts or calls, click Continue to login to log in to the application with a passcode received via text message or a phone call from Duo. If you added a landline phone number, click Continue to log in to the application with a phone call from Duo. STEP FOUR: ADD A BACKUP METHOD It's a good idea to add a second verification method that you can use as a backup if the first method you added isn't available to you at some point, like if you lose or forget your phone and need to log in with Duo, or if you want to access an application from a different MacBook than the one you used to set up Touch ID in Duo. When you click Continue after registering your first verification method, Duo prompts you to add another one. Choose any of the available methods and proceed through the steps for adding it. If you don't want to add another method at this time, click I don't want to add more devices. After you add a second login verification method, or if you chose to skip it, you'll arrive at the end of the Duo setup process. Click Log in with Duo to log in to the application using the Duo method you just added. ADD OR MANAGE DEVICES AFTER ENROLLMENT If enabled by your administrator, you can add additional verification methods, manage your existing devices, or reactivate Duo Mobile for Duo Push from the Duo Universal Prompt. When logging in to an application with the Universal Prompt, click the Other options link on the authentication page to view your list of available methods. If your organization enabled self-service device management then you'll see a Manage devices choice at the end of the list. Click that to enter the device management portal. To access the device management you'll first need to verify your identity, just as you do when logging in to a service or application protected by Duo. Click on an available option to verify your identity. If you're visiting device management to delete or update a device you don't have anymore (such as a phone you lost or replaced), be sure to pick a verification option that you still have with you. If you don't have any devices you can use to authenticate to device management, contact your organization's Duo administrator or help desk. After approving a Duo authentication request, you can see all your registered devices in the device management portal. ADD ANOTHER DEVICE To add a new method of verifying your identity in Duo, click Add a device and select one of the verification options. Duo takes you through the steps of adding the new device, just like first-time enrollment. The difference between adding a new device from device management and during first-time enrollment is that when you have finished enrolling the new device you return to the device management page to view all your registered devices, including the new one, instead of continuing to log into an application. When you access device management during login to a Duo Single Sign-On application or from Duo Centrals and use it to add platform authenticators, like Touch ID or Windows Hello, then you'll be able to use that authentication method to log in to Duo Single Sign-On applications without a password if your organization has enabled Duo Passwordless. RENAME OR REMOVE A DEVICE Click Edit and then Rename to give a device a new name to help you identify it. This new name shows up in the verification method list and on the authentication page when you log in with Duo to make it easier for you to identify which device you're using. To delete a device, click Edit and then Remove. You'll be able to confirm that you want to remove this device before deleting it. Once deleted, a verification device can't be restored, but if you still have the device available you can add it again. You can't delete your only identity verification device. REACTIVATE DUO MOBILE FOR AN EXISTING DEVICE If you have replaced the phone you activated for Duo Push, or if Duo Push stops working, you can get Duo Push working again without contacting your help desk. If your organization has self-service enabled then if a Duo Push authentication times out you'll see the I got a new phone link shown in the Universal Prompt. Click or tap that link to begin the reactivation process. If you still use the same phone number as you did when you first set up the phone to use Duo Push, then click or tap the Text me a link button. When the text message with the link arrives on your phone, tap it to automatically reactivate Duo Mobile on your phone to use Duo Push again. If you don't have Duo Mobile installed be sure to install it before you try to open the activation link in the text message. If you are using a different phone number than the one you first set up to use Duo Push then tap or click the I got a new number link. If you have a new phone number then you can't send yourself a text message with a Duo Push reactivation link. Click or tap Continue to proceed to the Duo self-service device management portal, where you can complete the steps to add your new phone number and set up Duo Push on the new phone so you can use it to log in with Duo. You'll still need to verify your identity with a different Duo verification method, so if you don't have one available you will need to contact your organization's help desk or Duo administrator for assistance. You can also reactivate Duo Mobile for use with Duo Push on a new phone from the device portal if it uses the same phone number as when you set up the original phone in Duo. 1. Locate the existing phone in the device management portal and click the I have a new phone link. 2. Click Get started if your phone uses the same phone number as before. If you want to add a new phone with a different number, cancel reactivation and follow the process for adding a new device instead. 3. Verify that you have access to the phone by clicking Send me a passcode or Or call my phone to receive a passcode from Duo. 4. Enter the verification passcode you received in a text message or phone call and click Verify . 5. Install the Duo Mobile app on your new phone if you hadn't already done so, open it and tap Add to scan the QR code shown on-screen, continuing the same steps you completed when you originally set up Duo Mobile for Duo Push on your phone. 6. Click Continue when you've finished reactivating Duo Mobile on your new phone to return to the device management portal. If your existing phone stops receiving Duo Push requests your Duo administrator or help desk might suggest that you try reactivating Duo Mobile on your phone with this process as a troubleshooting step. DEVICE NOTIFICATIONS Your organization may have enabled notifications when you add or remove a device in Duo. You could receive an email notification, a notification pushed directly to the device where you activated Duo Mobile, or both. To confirm that you did add or remove a device, click or tap Yes, this was me in the Duo Mobile notification. If you didn't add or remove a device, click or tap No, this wasn't me in the email message or Duo Mobile notification to let your Duo administrator know. If you click or tap No, this wasn't me your Duo administrator will receive an email reporting that there was fraudulent activity on your Duo account. LOG IN WITH THE DUO UNIVERSAL PROMPT After completing Duo enrollment (or if your Duo administrator set you up to use Duo), you'll see the Duo prompt the next time you perform a browser-based login to a web service or application protected with Duo. Learn how to log into browser apps using Duo in the Duo Universal Prompt guide HOW TO GET HELP If you can't authenticate or aren't sure what to do, contact your organization's Duo administrator or help desk for guidance. If you click Need help? at the bottom-left of the Universal Prompt your administrator may have customized the help text with further instructions or contact information. Please do not contact Duo Support directly, as Duo Support can only assist named Duo account administrators. If you see an error with an Event ID, provide that info to your Duo administrator or help desk. Jump to top Top CatalàČeštinaDanskDeutschEspañolEspañol (América Latina)SuomiFrançaisहिन्दीBahasa IndonesiaItaliano日本語한국어BokmålNederlandsPolskiPortuguêsPortuguês (Brasil)SvenskaไทยTürkçeTiếng Việt中文中文(繁體) Powered by Localize English By continuing to use our website, you acknowledge the use of cookies. Privacy Statement Change Settings CONSENT MANAGER Your Opt Out Preference Signal is Honored * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES * FUNCTIONAL COOKIES * SOCIAL MEDIA COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. From the list on left, please choose whether this site may use Performance and/or Targeting Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco not to sell or share your personal data. Note, blocking some types of cookies may impact your experience on the site and the services we are able to offer. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. VENDOR LIST ONETRUST Always Active PARENT COMPANY ONETRUST DEFAULT DESCRIPTION ONETRUST LLC (ONETRUST) IS A PROVIDER OF PRIVACY MANAGEMENT SOFTWARE PLATFORM. THE COMPANY'S PLATFORM SUPPORTS ORGANIZATIONS TO ADHERE COMPLIANCE WITH THE DATA PRIVACY, GOVERNANCE AND SECURITY REGULATIONS ACROSS SECTORS AND JURISDICTIONS. PERFORMANCE COOKIES Performance Cookies These cookies provide metrics related to the performance and usability of our site. They are primarily focused on gathering information about how you interact with our site, including: page load times, response times, error messages, and allowing a replay of a visitor’s interactions with our site, which enables us to review and analyze visitor behavior, helping to improve site usability and functionality. These cookies also allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site and will not be able to monitor its performance. VENDOR LIST CLOUDFLARE PARENT COMPANY CLOUDFLARE INC. DEFAULT DESCRIPTION CLOUDFLARE’S GLOBAL CLOUD PLATFORM DELIVERS A RANGE OF NETWORK SERVICES TO BUSINESSES OF ALL SIZES AROUND THE WORLD—MAKING THEM MORE SECURE WHILE ENHANCING THE PERFORMANCE AND RELIABILITY OF THEIR CRITICAL INTERNET PROPERTIES. ADOBE AUDIENCE MANAGER PARENT COMPANY ADOBE DEFAULT DESCRIPTION ADOBE AUDIENCE MANAGER IS ADOBE'S BEST-IN-CLASS DATA MANAGEMENT PLATFORM. NEW RELIC PARENT COMPANY NEW RELIC, INC. DEFAULT DESCRIPTION THE WORLD’S BEST ENGINEERING TEAMS RELY ON NEW RELIC TO VISUALIZE, ANALYZE AND TROUBLESHOOT THEIR SOFTWARE. NEW RELIC ONE IS THE MOST POWERFUL CLOUD-BASED OBSERVABILITY PLATFORM BUILT TO HELP COMPANIES CREATE MORE PERFECT SOFTWARE. LEARN WHY CUSTOMERS TRUST NEW RELIC FOR IMPROVED UPTIME AND PERFORMANCE, GREATER SCALE AND EFFICIENCY, AND ACCELERATED TIME TO MARKET AT NEWRELIC.COM. TWITTER PARENT COMPANY TWITTER INC. DEFAULT DESCRIPTION TWITTER IS AN AMERICAN MICROBLOGGING AND SOCIAL NETWORKING SERVICE ON WHICH USERS POST AND INTERACT WITH MESSAGES KNOWN AS "TWEETS". REGISTERED USERS CAN POST, LIKE, AND RETWEET TWEETS, BUT UNREGISTERED USERS CAN ONLY READ THOSE THAT ARE PUBLICLY AVAILABLE. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. VENDOR LIST AMAZON ASSOCIATES PARENT COMPANY AMAZON DEFAULT DESCRIPTION THE AMAZON AFFILIATE PROGRAM, OR AMAZON ASSOCIATES, IS AN AFFILIATE MARKETING PROGRAM. MICROSOFT BING ADVERTISING PARENT COMPANY MICROSOFT DEFAULT DESCRIPTION MICROSOFT IS A SOFTWARE CORPORATION THAT DEVELOPS, MANUFACTURES, LICENSES, SUPPORTS, AND SELLS A RANGE OF SOFTWARE PRODUCTS AND SERVICES. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. VENDOR LIST UNPKG PARENT COMPANY CLOUDFLARE INC. DEFAULT DESCRIPTION UNPKG IS A FAST, GLOBAL CONTENT DELIVERY NETWORK FOR EVERYTHING ON NPM. USE IT TO QUICKLY AND EASILY LOAD ANY FILE FROM ANY PACKAGE USING A URL. JQUERY PARENT COMPANY JQUERY DEFAULT DESCRIPTION JQUERY IS A FAST, SMALL, AND FEATURE-RICH JAVASCRIPT LIBRARY. WISTIA PARENT COMPANY WISTIA, INC. DEFAULT DESCRIPTION WISTIA IS A COMPLETE VIDEO HOSTING PLATFORM FOR BETTER MARKETING. TEALIUM PARENT COMPANY TEALIUM INC. DEFAULT DESCRIPTION TEALIUM SELLS ENTERPRISE TAG MANAGEMENT, AN API HUB, A CUSTOMER DATA PLATFORM WITH MACHINE LEARNING, AND DATA MANAGEMENT PRODUCTS, ALLOWING THEIR CUSTOMERS TO CONNECT THEIR DATA SO THEY CAN CONNECT WITH CUSTOMERS. AMAZON WEB SERVICES PARENT COMPANY AMAZON DEFAULT DESCRIPTION AMAZON WEB SERVICES, INC. IS A SUBSIDIARY OF AMAZON PROVIDING ON-DEMAND CLOUD COMPUTING PLATFORMS AND APIS TO INDIVIDUALS, COMPANIES, AND GOVERNMENTS, ON A METERED PAY-AS-YOU-GO BASIS. CISCO SYSTEMS PARENT COMPANY CISCO SYSTEMS, INC. DEFAULT DESCRIPTION CISCO'S HARDWARE, SOFTWARE, AND SERVICE OFFERINGS ARE USED TO CREATE THE INTERNET SOLUTIONS THAT MAKE NETWORKS POSSIBLE. WHOIS PRIVACY SERVICE PARENT COMPANY CENTRALNIC DEFAULT DESCRIPTION THE WHOIS PRIVACY PROTECTION SERVICE KEEPS YOUR CONTACT INFORMATION PRIVATE FOR A DOMAIN. GSTATIC PARENT COMPANY GOOGLE DEFAULT DESCRIPTION GSTATIC.COM IS A WEB DOMAIN OWNED AND USED BY GOOGLE FOR ACCESSING THE GSTATIC SERVER: A SERVER WHERE GOOGLE HOSTS ITS STATIC CONTENT LIKE CSS, IMAGES OR JAVASCRIPT. SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. VENDOR LIST FACEBOOK PARENT COMPANY META PLATFORMS, INC. DEFAULT DESCRIPTION FACEBOOK IS AN ONLINE SOCIAL MEDIA AND SOCIAL NETWORKING SERVICE OWNED BY META PLATFORMS. Back Button COOKIE LIST Filter Button Consent Leg.Interest Switch Label label Switch Label label Switch Label label Clear checkbox label label Apply Cancel Save Settings Allow All