Protected flows provide the functionality to view and change context data and to manage authentication tokens of users. In general, protected flows are all end-user flows accessible after authentication.
They require special consideration because a user must be properly authenticated and authorized to be allowed to use such a flow.
- Typical examples of protected flows are:
- address-change flow
- mTAN registration flow
- email address change flow
- Airlock 2FA, Cronto, and mTAN token management self-service
- FIDO registration self-service
- etc.