To secure your account in the event that the account password has been compromised, two-factor authentication (2FA) is mandatory.
Software Vulnerability Research allows the following 2FA configuration options:
• | Token-Based 2FA |
• | SMS-Based 2FA |
Token-based 2FA is the default and recommended option.
In case your phone is lost or compromised, two-factor authentication can be reset. The reset method varies by account type. For details, see Two-Factor Authentication Recovery.
Software Vulnerability Research Help LibraryMay 2019 |
Copyright Information | Flexera |