Return to list of success criteria

2.2.5 Re-authenticating [Level AAA]


Sufficient Techniques for 2.2.5 - Re-authenticating

Note: Other techniques may also be sufficient if they meet the success criterion.

  1. Providing options to continue without loss of data using one of the following techniques:

Note: Refer to Techniques for Addressing Success Criterion 2.2.1 for techniques related to providing notifications about time limits.

Back to top

Sufficent Techniques

Advisory Techniques

Back to top


Back to top


Back to top