A supplier of marketing and logistics web sites has been approached by a customer wanting to incorporate multifactor authentication. What approach should be taken and how should it be configured so as not to disrupt existing customers?
Authors: Grandon Gill, Joni Jones
Cite as: Gill, T.G. & Jones, J. (2016). Multi-factor authentication at Jagged Peak Muma Case Review, 1(4). 1-16. Retrieved from: http://pubs.mumacasereview.org/2016/MCR-01-04-Gill-JaggedPeak-p1-16.pdf