A two-step verification implemented to better protect both a user's credentials and the resources the user can access. User is granted access to certain resources such as web or application only after successfully presenting evidence to an authentication mechanism.
Show More
What's new in the latest 1.0.4
Last updated on May 17, 2024
Minor bug fixes and improvements. Install or update to the newest version to check it out!
We use cookies and other technologies on this website to enhance your user experience. By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.