Two factor authentication offers a second layer of security for a variety of computing environments. This type of authentication is effective for such purposes as web access control, securing cloud computing system access, creating secure extranets with strong authentication, eliminating hacking and phreaking on your VOIP systems, and increasing security on mobile devices. In addition to these purposes, this type of authentication can be used for any application, resource or system access where added security is required.
How to Set Up and Activate Your Two Factor Authentication System
It is not complicated to set up and activate our two factor authentication system. In most cases, there are only three basic steps required. First, if necessary, change the location of your login page. Next, configure your server to use Digi-Access and customize your ISS error pages. Finally, invite your users to obtain their Digi-Access certificate and approve those requests.