Bypass the need for a user to authenticate using their secondary authentication method.
If a user of the PingID service doesn't have access to the mobile device that is paired with PingID, you can bypass a user's secondary authentication for a selected duration. At the end of a limited duration, secondary authentication for the user resumes automatically.