In-reply-to » Protecting Internal Web Resources

@off_grid_living@twtxt.net It’s essentially behind two forms of authentication. Yhere is no way to access the resources without a valid set of credentials and what’s called a TOTP setup by that user with a device.

⤋ Read More