Two-factor Authentication in the user’s hand
With the user’s encrypted credentials in the app and the phone’s inherent PIN, fingerprint or facial recognition, two-factor authentication is achieved. Even if the user’s phone is lost or stolen, it cannot be used to access your networked printers.