Multi-factor Authentication: Email
Add extra security (and peace of mind) to user logins and registrations. With two-factor authentication users log in with a username and password (or by using social login) and then, on top of that, must enter an access code sent to them via email or text message. Without that access code users can't be fully logged on and won't be issued the requisite access, refresh, and identity tokens.
Introduction to 2FA
Add an extra layer of security to Hosted Login v2.
2FA and user registrations
How, and when, is two-factor authentication used when a new user registers for an account?
2FA and user logins
How, and when, is two-factor authentication used when an existing user logs in to their account?
Unfinished 2FA sessions
What happens when a two-factor authentication session is interrupted or abandoned?
Users with a verified mobile number but no verified email address
Can a user without a verified email address log in by using two-factor authentication? In a word: no.
Introduction to trusted devices
Two-factor authentication and trusted devices add extra security to Hosted Login while minimizing login hassles for your users.
The device part of a trusted device
Turns out that a device is more than just a piece of hardware.
The "Trust this device" checkbox
Select the Trust this device for future logins checkbox in order to designate a device as a trusted device.
Two-factor authentication options
A detailed look at the different ways you can deploy two-factor authentication.
Updated 3 months ago