authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism
--Agreed Upon Solutions
The discussion does not exist would you like to add the first comment?