Do you have some step by step details? I'm not a developer. Or does it need
code changes?

Debbie Watkins

CEO and Co-founder, Lucy
Sent from my mobile device

On Wed, 19 Aug 2020, 19:45 Saransh Sharma, <[email protected]> wrote:

> 2FA works by enabling it on run time , you can simply run 2FA by doing
> this
>
> ./gradlew bootRun -psecurity=twofactor
>
> Similarly you can run this with oauth also.
>
> let me know if this works for you.
>
> On the functional side its quite easy and visible
>
>
> On Wed, Aug 19, 2020 at 9:58 AM Debbie Watkins | Lucy <
> [email protected]> wrote:
>
>> Hello, can someone provide me with a step-by-step set of instructions on
>> how to set this up please? And does it work correctly?
>>
>> Best regards, Debbie
>> [image: Your Company] <http://www.lucytribe.com/>
>> Debbie Watkins
>> CEO and Co-founder <https://www.linkedin.com/company/lucy-community>
>> [image: T:]  +65 6817 1160
>> [image: E:]  [email protected]
>> *Lucy* | *Turning the unbanked into the unstoppable*
>> www.welucy.com
>>
>
>
> --
> Thanks and regards,
>
> Saransh Sharma
> Research Partner
>
> This mail is governed by Muellners®  IT policy.
> The information contained in this e-mail and any accompanying documents
> may contain information that is confidential or otherwise protected from
> disclosure. If you are not the intended recipient of this message, or if
> this message has been addressed to you in error, please immediately alert
> the sender by reply e-mail and then delete this message, including any
> attachments. Any dissemination, distribution or other use of the contents
> of this message by anyone other than the intended recipient is strictly
> prohibited. All messages sent to and from this e-mail address may be
> monitored as permitted by applicable law and regulations to ensure
> compliance with our internal policies and to protect our business. E-mails
> are not secure and cannot be guaranteed to be error free as they can be
> intercepted, amended, lost or destroyed, or contain viruses. You are deemed
> to have accepted these risks if you communicate with us by e-mail.
>

Reply via email to