Loss of a second factor

The following procedure may be used when a user needs to access a protected application, but doesn't have his second authentication factor available:


Revision #1
Created 1 July 2022 08:24:38 by WALLIX Admin
Updated 24 October 2023 14:39:32 by WALLIX Admin