Configuration restrictions and guidelines

When you configure triple authentication, follow these restrictions and guidelines: