Authenticator policy
This section covers authenticator policies that control which authenticators can be used and how they behave.
- Authenticator policy: Overview and configuration of authenticator policies
- Authenticator policy samples: Sample policy configurations and use cases
Authenticator policies allow you to:
- Define which authenticator types are allowed
- Set security requirements for authenticators
- Control authenticator behavior and capabilities
- Enforce organizational security standards