Security Architecture with 2FA
I am building a small application for better understanding security from the ground up and have a question about authentication flow (I believe this would be 2FA):
User provides information required to register with application.
Form validation prom...