Regulatory Requirements
IT regulatory standards for access to Federal Government systems require the use of two-factor authentication to access sensitive IT resources, for example when logging on to network devices to perform administrative tasks and when accessing any computer using a privileged login. Consequently, developers of software frameworks that control privileged access to computers and network appliances support numerous two-factor authentication schemes in their products.
Read more about this topic: Two-factor Authentication