Authentication management
Abstract:
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.
Public/Granted literature
Information query
Patent Agency Ranking
0/0