Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


Figure 4.7 illustrates the two-factor authentication and authorization process.<place for figure>

Drawio
bordertrue
viewerToolbartrue
fitWindowfalse
diagramName4.7(231page)
simpleViewerfalse
width
revision1


Anchor
Best Practices for Configuring Two-Facto
Best Practices for Configuring Two-Facto
Anchor
bookmark482
bookmark482
Best Practices for Configuring Two-Factor Authentication
Only superusers and limited-access users with the correct permissions can configure two-factor authentication. For information about admin roles and permissions, see Managing Admin Groups and Admin Roles. To configure two-factor authentication, consider the following:

...