Reducing MFA/2FA requests on cloud apps

Intro Third party authentication and authorisation providers like okta, azure, gcs or aws often have a trusted connection to the tenants. This sometimes allows that authentication requests via MFA/2FA options can be bypassed as the authentication has already occured from inside the tennants network. When employees work from remote locations they can set up a […]

Reducing MFA/2FA requests on cloud apps Read More »