What is the correct order of precedence of strong verification methods for MFA logins?
Salesforce Authenticator, Third-party TOTP authenticator apps, Security keys
Security keys, Salesforce Authenticator, Third-party TOTP authenticator apps
Third-party TOTP authenticator apps, Security keys, Salesforce Authenticator
Salesforce Authenticator, Security keys, Third-party TOTP authenticator apps
Submit