Previous Topic: Availability of Mobile Client for ArcotID PKI AuthenticationNext Topic: Known Issues


Support for Two Step Authentication

Secondary authentication is typically invoked when performing sensitive tasks, such as when authenticating roaming users or resetting passwords. To enhance the level of security of a protected resource during secondary authentication, CA CloudMinder now enables you to chain two secondary authentication methods. When the two-step authentication feature is enabled, both the configured authentication methods are invoked one after the other.