Access through secondary means

Control access

Access to data relies on someone being already authenticated somewhere else. For example, a person can log into a service by clicking a link sent to an email account they’re already logged into.

  • Slack magic links: a link is sent to a Slack user’s registered email address, allowing them to log into the service without a password