Two-factor Authentication - Regulatory Requirements

Regulatory Requirements

IT regulatory standards for access to Federal Government systems require the use of two-factor authentication to access sensitive IT resources, for example when logging on to network devices to perform administrative tasks and when accessing any computer using a privileged login. Consequently, developers of software frameworks that control privileged access to computers and network appliances support numerous two-factor authentication schemes in their products.

Read more about this topic:  Two-factor Authentication