Implementing Using Access Authenticator

This guide describes how to configure and use Access Authenticator. It describes how toadministrators can tailor Access Authenticator to fit the security needs of their organization, how users can register devices to act as authentication factors, and how tothose users can authenticate using a registered device.

NOTE: The separate Access Authenticator Implementation Guide is an abbreviated resource that includes only the following implementation instructions, and in a slightly abbreviated format.

 

 

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
1.3 | 201805100343 | May, 2018