🔐Double Protect! your client assets are in safe with addition authenticator code
There is an attention for using this function! Please read carefully before operate
Last updated
There is an attention for using this function! Please read carefully before operate
Last updated
This is the new feature to protect your clients assets with authenticator. Learn and use are so easy. Using Authenticator Below Image explained how to model in your codes. You can use everywhere. Every secret tokens are stored under AES encryption. But Pirichain accepts absolutely no responsibility if you experience victimization.
As you see that below image. once you attemp to generate token. System will give you or your client a secret token and you can define your mobile phone.
Double control with your clients assets. Even anyone knows the private key or secret phrase , its not enough steal their assets if you code authenticator.
Attention: System will give 30 minutes to get Secret Token for defining the mobile authenticator Application or storing external environment. If the time exceed user cannot reach the authenticator secret token!
Once you add in your phone authenticator application , system will give you diffenrent tokens per minutes.
And you can write here to validate your token in PSce.
If you type wrong token system will give an error such above message. But of course all of conditions or situation depend your code.
You can investigate this PSce in testnet. https://scanner.pirichain.com/scenario/PRTMR7HhU3fJEqrRjU9P97Qk16QQDfHKk8snGUyp6dy