24. Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.
Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
25. Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.
Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
26. Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.
Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
27. Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.
Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
60. Many graphics from The Noun Project
Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by
Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher;
Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.