Now the first part focuses on password policies, the second part focuses on alternatives to passwords.
A better order would be to first consider alternatives and when passwords should be used. Then as a second step focus on password policies for those cases.
Now the first part focuses on password policies, the second part focuses on alternatives to passwords.
A better order would be to first consider alternatives and when passwords should be used. Then as a second step focus on password policies for those cases.