Using Access Authenticator

This guide describes how to register devices to act as authentication factors, and how to authenticate using a registered device.

NOTE: The separate Access Authenticator Implementation Guide is an abbreviated resource that includes only the following implementation instructions, and in a slightly abbreviated format.

 

 

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
1.3 | 201807251235 | July, 2018