To secure your account in the event that the account password has been compromised, two-factor authentication (2FA) is mandatory.
Software Vulnerability Research allows the following 2FA configuration options:
| • | Token-Based 2FA | 
| • | SMS-Based 2FA | 
             
        
Token-based 2FA is the default and recommended option.
In case your phone is lost or compromised, two-factor authentication can be reset. The reset method varies by account type. For details, see Two-Factor Authentication Recovery.
| Software Vulnerability Research Help LibraryMay 2019 | Copyright Information | Flexera |