...
In these examples a first factor method is available if:
it is allowed for the application;
it is linked with a second factor method.
A second factor method is available if:
it is allowed for the application;
a method attribute with the expected name for the second factor method exists and has non-empty value.
First factor | Second factor | User authentication |
---|---|---|
Available | Available (at least one) | First and second factor methods authentication is required |
Available | Unavailable | First factor method authentication is required |
Unavailable | Available (at least one) | Second factor method authentication is required |
Available | Allowed, but doesn’t return the field | Access denied |
Unavailable | Unavailable | Access denied |
...