Summary
Guide for UT San Antonio Faculty, Staff, and Students: What to Do if a DUO Push Is Denied and What to Expect
When a DUO push notification is denied, faculty, staff, and students at UT San Antonio may wonder what steps to take next. This guide explains the steps to take immediately after a denied push and outlines what you can expect during the process. Whether the denial was accidental or intentional, understanding these next steps will help you maintain secure access to university systems an
Body
Duo Push Authentication Guide - For UT San Antonio Faculty, Staff and Students
Duo Push makes authentication simple and reliable by using your mobile device to verify your login.
- Approve – Confirms your identity and grants access to the application.
- Deny – Blocks the login attempt, helping prevent unauthorized access.
Step 1: Initiate Authentication
- When logging into a Duo-protected application or service, select Duo Push as your authentication method.

- A login request will be sent to your registered mobile device.

Step 2: Respond to the Push Notification
- If the request is expected:
Tap Approve to authenticate successfully
- If the request is unexpected:
Tap Deny to reject the login attempt
Step 3: Handle Unexpected Requests
- After tapping Deny, you’ll be asked:
“Was this a suspicious login?”

- Tap Yes if you did not initiate the login and suspect fraud.
- Duo will:
- Silence all Duo Mobile notifications for 20 minutes
- Allow you to approve requests manually via the Duo Mobile app
- Send a Fraudulent Authentication Report email to Duo Admins
- Tap OK to continue to the Duo Mobile app.

- Tap No if the login was not suspicious (e.g., accidental request).
Step 4: Security Best Practices
- Denying a Duo Push has no negative implications.
- Marking a request as suspicious helps report fraudulent activity.
- Never respond to emails requesting your username, password, or phone number.
- Forward suspicious emails to Spam@uthscsa.edu or click the Phish button.
- Contact the Service Desk at 210-567-7777 opt 1 to verify legitimacy
Step 5: If Credentials Were Compromised