
Student MFA
Helping to prevent unauthorised access to UCD student accounts

Gradual Transition to Microsoft 365
One of the objectives of the new UCD Strategy to 2030 is to deliver a digital campus that supports our goals and creates the best digital experience for our students.
In line with this ambition, the University Management Team has decided to transition from Google Workspace to the Microsoft 365 platform as the primary technology for communication and collaboration for all UCD students.

What does this mean for you?
- Students graduating in Academic Years 2024/25 and 2025/26 will not be affected by this transition and continue to use their Google accounts until graduation.
- All other student accounts will migrate to Microsoft during 2026. Online training and a comprehensive support service will be provided to help this migration. Further information on this will be provided towards the end of 2025.
- In addition, during 2025, we plan to introduce multi-factor authentication for all student accounts to help prevent unauthorised access to these accounts.

Multi-Factor Authentication for UCD Student Accounts
UCD IT Services is introducing Multi-Factor Authentication (MFA) for all student accounts, as an important IT security measure.
MFA adds a second layer of security to help prevent unauthorised access to your sensitive information online. Essentially, students will be required to enter a code as an additional security step when logging into their UCD Connect accounts.
No action is needed for now, and UCD IT Services will be in touch directly with all students in the coming months about the next steps.
Why do we need MFA?
Your password alone is not enough to keep identity thieves from getting into your account.
You could be at risk of having your password stolen if you:
- Click the links in email messages
- Download software online
- Infrequently change your password
- Use the same password for multiple accounts
If an identity thief steals your UCD username and password, they can:
- Delete your contacts and files
- Lurk in your email account to get information about your work
- Use your account to get to your personal accounts (bank, credit card, etc.)
- Impersonate you to gain access to your contacts’ accounts