Manage trusted devices
What Happens When You Trust a Device?
Employ and enforce two-factor authentication (2FA), but without requiring users require to undergo 2FA each time they log in.
Note that two-factor authentication and trusted devices are available only in Hosted Login v2.
Trusted devices
-
Modify the trusted device time-to-live value
Specify how long a user logging in with a trusted device can bypass two-factor authentication. -
Untrust a device
Is it possible to “untrust” a trusted device? Yes, but it's not really recommended.
Related articles
Related videos
Updated about 2 years ago