Users Sharing Authenticators
Detects users with shared authenticators/phones. Shared authenticators reduce security and user accountability and increase the attack surface.
It is recommended to avoid sharing authentication credentials, including phone authenticators, and instead, encourage each user to have their own separate authentication methods to protect their accounts and data from potential threats.
Recommended Actions
We recommend not sharing phones and devices where possible; please investigate.
If user sharing devices number is high, please make sure your onboarding process is secured.
Compatibility
Last updated