2.2.5: Re-authenticating [AAA]
Description
When an authenticated session expires, the user can continue the activity without loss of data after re-authenticating.
Sufficient Techniques
Sufficient Techniques for Success Criterion 2.2.5
Note: Other techniques may also be sufficient if they meet the success criterion. See Understanding Techniques.
- Providing options to continue without loss of data using one of the following techniques: