Return to list of success criteria
3.3.7 Accessible Authentication [Level A]
Description
Sufficient techniques
Advisory techniques
Failures
Notes
Description
If an authentication process relies on a cognitive function test, at least one other method must also be available that does not rely on a cognitive function test.
Back to top
Sufficent Techniques
Advisory Techniques
Back to top
Failures
Back to top
Notes
Back to top