Loss of a second factor

The following procedure may be used when a user needs to access a protected application, but doesn't have his second authentication factor available:


Revision #1
Created 1 July 2022 08:24:38 by WALLIX Admin
Updated 11 March 2025 08:15:09 by WALLIX Admin