Show Sidebar Log in
  • Welcome
  • Our Approach
        • Website Purpose
          • Aims and Objectives
          • Operating Principles
          • Mindfulness in Meetings
          • Meeting Processes
        • Website Features
          • MeetingArk WIki
          • Diagnostic Tools
          • Insights and Analysis
          • Discussion Groups
          • Global Perspectives
        • Using MeetingArk
          • What to do first?
        • About MeetingArk
          • Our Future Plans
            • Support Us
        • Contact
        • Help Centre
          • Send a Message
          • Managing Email Notifications
        • Welcome to Our Approach

          A group of business people having a meeting with a dramatic space art background
  • Resource Centre
        • Resource Overview
          • The Meeting Post Blog
          • MeetingArk Wiki
        • Social Media
          • Social Networks
          • Podcasts
          • People
          • Site-wide Activity
        • Social Media and Social Sharing

          RSS
          Follow by Email
          Facebook
          Facebook
          fb-share-icon
          Twitter
          Visit Us
          Follow Me
          Post on X
          Youtube
          Youtube
          Pinterest
          Pinterest
          fb-share-icon
          LinkedIn
          LinkedIn
          Share
          Instagram
        • Recently Active Members

          Profile picture of AiYa - MeetingArkAdmin
          Profile picture of Ron Eagle
          Profile picture of RE Superflex 4.5in
          Profile picture of farah mughal
          Profile picture of Andrew Gurnham
          Profile picture of Andrew Gurnham
          Profile picture of kieranfoley
          Profile picture of MeetingMoose
          Profile picture of Soph
          Profile picture of strategic.creative
          Profile picture of Michael Servant
          Profile picture of Silver Birch 7
        • Who’s Online

          There are no users currently online
        • Welcome to the MeetingArk Resources Centre

          A group of diverse people is using digital devices
  • Discussions
        • Meeting Stages...
          • Arranging a meeting
          • Commencing a meeting
          • Running a meeting
          • Participating in a meeting
          • Meeting etiquette
          • Closing a meeting
          • Meeting feedback & follow-up
        • Other Discussions...
          • Meeting Humour
          • Meeting Companies
          • Authors and Books
          • Meeting Technologies
        • Make meetings be better, be different!

          Register to join our community discussions!
  • Meeting FAQs
        • :Arranging a Meeting

        • Arranging a meeting
        • Commencing a meeting
        • Running a meeting
        • Participating in a meeting
        • Meeting etiquette
        • Closing a meeting
        • Meeting feedback and follow-up
        • Welcome to the MeetingArk FAQs

          Welcome to the MeetingArk Searchable FAQs
  • Meeting Analysis
        • Analysis Overview
        • Rate Your Meeting
        • Analysis Results
        • Welcome to Meeting Analytics

  • Insights, AI & Culture
        • Insights
          • Arranging a Meeting
          • Commencing a Meeting
          • Participating in a Meeting
          • Running a Meeting
          • Meeting Etiquette
          • Closing a Meeting
          • Feedback & follow-up
        • AI & Meetings
          • AI Meeting Tools
          • Data & Optimisation
          • Collaboration and Decision-making
          • Future Trends
          • Integration with Technology
          • Legal and Ethical Issues
        • Cross-culture
          • Cultural Dimensions
          • Global Practices
          • Meeting Dynamics
          • Communication Strategies
          • Cultural Intelligence
          • Global Compliance
          • Leadership Strategies
        • Welcome to Meeting Matters deep dives

          Explore our deep dives into general meeting productivity, artificial intelligence and meetings - and how meetings work across the world.
MeetingArk
  • Register
  • Login

Changing Your Password

To reset your password, go to  https://commons.gc.cuny.edu/wp-login.php?action=lostpassword and enter either your username or email address. Click on Get New Password.  You will receive an email with  a link to a page where you can reset your password.

Security Settings

To access the Security screen below, go to the top black navigation bar, hover over your avatar in the upper right hand corner. A dropdown menu will appear. Scroll down the My Settings and select Security.

 

Changing Your Account Email

You can change your Account Email on this screen to the one you prefer. Simply over type your existing email with the one your prefer. Click on Save Changes and an email will be sent to this email address to ensure it is valid. You will need to respond to this email to verify the address is correct.

Your account email is used for notifications on the Commons. It is also used when you forgot your password or when you use Two-Factor Authentication (see below).

Changing An Existing Password

To change your password or to optionally enable two factor authentication, log into the Commons and go to My Settings>>Security. If necessary, re-enter your existing password.  If you only want to change your password, click on the Generate Password button. If you don’t like the generated password you can over-write it to the password you prefer. Then click on the Save Change button. Your password is now changed.

Two-Factor Authentication (optional)

Two-factor authentication (2FA) adds an extra layer of security when logging into the Commons. With 2FA, you have to log in with your username and password and also provide another form of authentication that only you know or have access to. The Commons supports 2FA during login and offers four different 2FA options, listed below.

Unless you own a security key, we strongly recommend using a Time-Based One-time Password (TOTP) application to configure two-factor authentication. TOTP is more reliable and portable than the email option, especially when you do not have internet access to check your email.

Enabling 2FA

Members can enable multiple 2FA options, but only one can be primary. It is a good idea to have backup ways to obtain your authentication code

  • Email 

    Using this method, your authentication code will be delivered via email. If you’re unable to use a TOTP app, you can also authenticate with email. When configured as your primary 2FA option, an authentication code will be sent to your registered email address during login. This code will need to be entered in order to gain access to your Commons account.

To use this option:

    1. Enable the Email option.
    2. Click Save Changes.

  • Time-Based One-Time Password (the preferred method)

A time-based one-time password (TOTP) application automatically generates an authentication code that changes after a certain period of time. When configured as your primary 2FA option, you will be asked to enter this code from your TOTP app during login.

To use this option:

    1. Ensure you have downloaded a TOTP app onto your device. Popular cross-platform apps include Authy, 1Password, LastPass, Duo.
    2. Enable the Time-Based One-Time Password (TOTP) option.
    3. Scan the QR code with your TOTP app. After scanning, the app will display a six-digit code. (If you are unable to scan the QR code, find the Key field under the QR code and manually copy the key into your TOTP app.)
    4. Next, enter the six-digit code into the Authentication Code field and click on Complete Set Up.
    5. TOTP should now be set up as a 2FA option. If you haven’t set up recovery codes, it is highly-recommended to enable this option as well.

Entering the authentication code to enable the TOTP option

  • Security keys

We support USB security keys as a form of two-factor authentication. (A security keys is a physical device that you carry with you and insert into a USB port one the computer you are accessing.) When configured as your primary 2FA option, you will be asked to enter your USB security key during login.

If you have a USB security key, you can register your key as a 2FA option by:

    1. Enabling the Security Keys option.
    2. This will toggle a “Security Keys” section after the 2FA table.
    3. Click on Register New Key and when prompted, insert your USB security key into your device.
    4. Your security key should now be displayed under the Security Keys section. If you haven’t set up recovery codes, it is highly-recommened to enable this option as well.

Configuring your security key

  • Recovery Codes

It is highly-recommended to enable recovery codes if you have configured another 2FA option. This can help you get back into your account if you ever lose access to your other 2FA device(s).

To use this option:

  1. Enable the Recovery Codes option.
  2. Click on Generate New Recovery Codes.
  3. Copy or download the codes when they are displayed. These codes will only be displayed once. If you misplace your recovery codes, you can generate a new set of codes by clicking on the button again.
  4. Click Save Changes.

Generating a new set of recovery codes

 

 

  • Privacy Policy
  • Help Page
  • Contact
  • Cookie Policy (UK)
  • Terms & conditions
Powered by Commons In A Box
  • Register
  • Login
  • Home Page
  • The Meeting Post
  • Resources
    • Back
    • The Meeting Post Blog
    • Social Networks
    • Podcasts
    • Site-Wide Activity
    • People
    • Back
  • Meeting FAQ
    • Back
    • FAQ1: Arranging a meeting
    • FAQ2: Commencing a meeting
    • FAQ3: Running a meeting
    • FAQ4: Participating in a meeting
    • FAQ5: Meeting etiquette
    • FAQ6: Closing a meeting
    • FAQ7: Meeting feedback and follow-up
    • Back
  • Discussion Groups
    • Back
    • Arranging a Meeting
    • Commencing a Meeting
    • Participating in a Meeting
    • Running a Meeting
    • Meeting Etiquette
    • Closing a Meeting
    • Meeting Feedback & Follow-up
    • Back
  • About
    • Back
    • Contact MeetingArk
    • Cookie Policy (UK)
    • Accessibility
    • Back
MeetingArk
Manage Cookie Consent
We use cookies to optimise our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Skip to toolbar
  • About WordPress
    • WordPress.org
    • Documentation
    • Learn WordPress
    • Support
    • Feedback
  • Log in
  • Register