↳
In-reply-to
»
Protecting Internal Web Resources
⤋ Read More
@off_grid_living@twtxt.net It’s essentially behind two forms of authentication. Yhere is no way to access the resources without a valid set of credentials and what’s called a TOTP setup by that user with a device.