What Happens When You Trust a Device?
Employ and enforce two-factor authentication (2FA), but without requiring users require to undergo 2FA each time they log in.
Note that two-factor authentication and trusted devices are available only in Hosted Login v2.
Modify the trusted device time-to-live value
Specify how long a user logging in with a trusted device can bypass two-factor authentication.
Untrust a device
Is it possible to “untrust” a trusted device? Yes, but it's not really recommended.
Updated 3 months ago