It is your sole responsibility to identify safe and private systems where you would like IP authentication to be used. Once identified in future log ins, this will be considered one step of the multi-factor authentication process and the pictures and phrases and/or challenge questions may not be asked. If you indicate a computer you are logging on to is safe and private, we will identify the IP address used for that log in during future log ins using that computer and IP.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |