User Verification
Authentication● Common

Local verification on an authenticator proving the authorized user is present. Methods include PIN, fingerprint, or face recognition on the device.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions