Since opening in 1995, Aeries Software has successfully implemented the Aeries Student Information System (SIS) in over 600 public and private school districts and education agencies, becoming California’s most popular and trusted SIS along the way. With our intimate knowledge of education technology, proactive involvement with educational departments, and numerous channels for ongoing user input, Aeries is continuously improving and evolving. As the focal point of your student data management ecosystem, the Aeries emphasis on open architecture and interoperability establishes a coordinated network of comprehensive systems working together in harmony.
Aeries SIS now integrates with Duo for two-factor authentication, preventing unauthorized access to the system even if a username and password are compromised. With this integration, Aeries can be configured to not only authenticate users with Duo when they log in, but also when they navigate to several specific pages including Gradebook, Grades, and Transcripts. If you’re ready to take steps to tighten up the security of your sensitive student data, take a look at the Aeries-Duo integration today!
Review the Aeries-Duo instructions on the Aeries Online Help site and contact Aeries for additional information or technical support.
Duo Security integrates seamlessly into your VPNs, servers, and web applications to provide two-factor authentication for all of your remotely accessible services.
Whether online or offline Duo supports a variety of authentication methods including smartphone mobile apps, cell phones, landlines, and tokens. Users can have multiple devices and choose their preferred method during login. Learn more »
Most customers get their first Duo integration up and running within 15 minutes. Check out the documentation to see how to configure Duo with your remotely accessible service.
Once deployed users set up their phones as authentication devices using Duo’s self-enrollment process. User-friendly guides are provided online.
The Duo Admin Panel provides a powerful management console for your IT staff. Forgotten phones? Lost tokens? Administrators can help employees set up new phones and get temporary bypass codes. All authentication attempts and admin actions are fully logged and able to be quickly filtered.