Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  •  The user has a smartphone (or similar) that has access to the internet with a operating system that can protect user credentials and other data.
  • The user has access to one or more wallets that will hold their credentials in the protected data store.
  • The user has an expectation that they have loaded the credentials that will be needed to access the resource of interest to them.

...