Error


Your account is required to use two-factor authentication to access NIH/eRA systems. Please setup and use either a Login.gov account or an InCommon Federated account that supports NIH?s two-factor authentication standards. For further information, please see the following:

Error


Login to NIH/eRA systems requires two-factor authentication. Either your institution does not support two-factor authentication, or your institution has not enabled your account for two-factor authentication. Please contact your local IT department (whoever manages your account) to inquire about the ability to support two-factor authentication for your account. If two-factor authentication is not available through your institution, you may also register for and use an account from Login.gov. For further information, please visit:

Error


PIV login is required. Please login using the Login with PIV/CAC option.

Error


The eRA credentials you entered are invalid and the account has now been locked. Please contact your organization's account administrator for assistance or use forgot password/unlock account link after 15 mins.

Error


The eRA credentials you entered are invalid, please contact your organization's account administrator for assistance.

Login with PIV/CAC


 

You are accessing a U.S. Government information system, which includes (1) this computer, (2) this computer network, (3) all computers connected to this network, and (4) all devices and storage media attached to this network or to a computer on this network. This information system is provided for U.S. Government-authorized use only.

Unauthorized or improper use of this system may result in disciplinary action, as well as civil and criminal penalties.

By using this information system, you understand and consent to the following:

1.

You have no reasonable expectation of privacy regarding any communication or data transiting or stored on this information system. At any time, and for any lawful Government purpose, the government may monitor, intercept, and search and seize any communication or data transiting or stored on this information system.

2.

Any communication or data transiting or stored on this information system may be disclosed or used for any lawful Government purpose.