Don’t have access to the mobile app ?

🎯 Purpose

Provides recovery assistance for users who cannot access their REL-ID mobile application to approve push notifications required for second-factor authentication completion.


📍 Context and Availability

  • Trigger Scenario: User cannot approve push notification sent to mobile app
  • Screen Location: Push notification waiting screen
  • Link Text: "Don't have access to the mobile app? Click here"
  • Authentication State: First factor completed, push notification sent

🖥️ Push Notification Recovery Interface

🔔 Recovery Link Presentation


📱 Mobile App Access Issues in Partial-login

🚨 Common Scenarios

IssueDescriptionUser Impact
Device UnavailableMobile device lost, stolen, or damagedCannot receive or approve push notifications
App MalfunctionREL-ID app not respondingCannot interact with push notifications
Connectivity IssuesMobile device offline or poor connectionPush notifications not delivered
Notification BlockedPush notifications disabled or blockedCannot see authentication requests
Battery DeadMobile device without powerCannot access mobile application
App DeletedREL-ID application removed from deviceNo push notification capability

🔄 Recovery Process Flow

🆘 Push Notification Recovery

  1. Recovery Link Click: User clicks mobile app access recovery link
  2. Context Preservation: System maintains first factor authentication state
  3. Alternative Methods: User presented with alternative second factor options
  4. Method Selection: User chooses available alternative authentication method
  5. Factor Completion: Alternative second factor authentication completed
  6. Authentication Success: User gains access after completing alternative factor

🔄 Alternative Second Factor Options

Available alternatives depend on user profile and system configuration:

  • Time-based OTP: Use TOTP codes from mobile app (if app accessible for codes only)
  • Email OTP: Switch to email-based one-time password
  • SMS OTP: Switch to SMS-based one-time password
  • Password Challenge: Additional password verification
  • Full Recovery: Complete identity verification process

🎯 User Experience

📱 Contextual Recovery

  • Immediate Help: Recovery option available during push notification wait
  • State Preservation: First factor authentication maintained during recovery
  • Clear Options: Alternative methods clearly presented
  • Smooth Transition: Seamless switch to alternative authentication methods

🔄 Recovery Flow Diagram


⚠️ Important Considerations

🔒 Security Maintenance

  • Factor Equivalence: Alternative factors provide equivalent security
  • Authentication State: First factor authentication preserved
  • Audit Trail: Recovery actions properly logged
  • Session Integrity: Authentication session maintained throughout recovery

🎯 Recovery Efficiency

  • Quick Access: Immediate access to recovery options
  • Multiple Alternatives: Several recovery paths available
  • User Choice: Users can select preferred alternative method
  • Completion Focus: Recovery designed for authentication completion