Manage trusted devices

What Happens When You Trust a Device?


Employ and enforce two-factor authentication (2FA), but without requiring users require to undergo 2FA each time they log in.

Note that two-factor authentication and trusted devices are available only in Hosted Login v2.


Trusted devices


Related articles


Related videos