...
Figure 4.7 illustrates the two-factor authentication and authorization process.<place for figure>
Drawio |
---|
border | true |
---|
viewerToolbar | true |
---|
| |
---|
fitWindow | false |
---|
diagramName | 4.7(231page) |
---|
simpleViewer | false |
---|
width | |
---|
revision | 1 |
---|
|
Anchor |
---|
| Best Practices for Configuring Two-Facto |
---|
| Best Practices for Configuring Two-Facto |
---|
|
Best Practices for Configuring Two-Factor Authentication Only superusers and limited-access users with the correct permissions can configure two-factor authentication. For information about admin roles and permissions, see
Managing Admin Groups and Admin Roles. To configure two-factor authentication, consider the following:
...