Implementing Access Authenticator

This guide describes how to configure and use Access Authenticator. It describes how administrators can tailor Access Authenticator to fit the security needs of their organization, how users can register devices to act as authentication factors, and how those users can authenticate using a registered device.

 

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.