Auth0 okta CIC App User Guide
Implementation Guide Flag sensitive transactions for step-up authentication Background Once a user has signed in, there may be parts of your platform you still want to safeguard with additional layers…