List of Users using Two-Step Authentication
An organization wishing to implement a policy requiring the use of Two-Step Authentication has no way to audit which users accessing their information have or have not enabled two-factor authentication.
Could a system administrator, who can view...