 What's up everybody? Today, I'm going to show you how to set up multi-factor authentication using the push notifications from the OZero Guardian app. Head over to OZero.com and sign in to your account or create a new one if you don't have one already. Once you get to your dashboard on the left-hand side here, we're going to create a new application inside of my own tenant. So inside of applications, I'm going to create a new application. For this example, I'm just going to create a single-page web app. It's going to be a React app. It's going to be pretty basic and we're going to use the starter code that's provided on the next screen to hook it all up. So a single-page web app and I'll say Guardian Example. Once we push create on this, I'm going to click on the React option here of the screen. And then if you don't have this set up already that you can play around with, feel free to download this sample, view it on GitHub and get it running locally. After cloning and being installing and running this locally, you'll see an application that looks like this. It's just a basic React spa example here where you already get the login button built in for you. So we just need to hook it up with Auth0. Go ahead and open up that code on your machine and we're going to update two values. So this is the basic structure of that React code. Basically, just a React app with a server file set up already for us, this API-server. What we need to do is update values inside of the auth underscore config.json. We need to add the domain and client ID. I'm going to delete the audience because we're not going to be using that today. So go ahead and remove the values inside of that. And then we need to go back to the application that we just created and insert the correct ones. So inside of that application, go to settings and then grab the domain and the client ID. Make sure you're saved and then MPM start again. Make sure you got that running. And before we go and view that app, the last thing we need to do is add our local host URL to three different places. The callbacks, the logouts, and the allowed web origins. So in my case, again, it's just localhost 3000. So I'm going to go ahead and add that. Perfect. And then just don't forget to save so that our changes are live. Awesome. So with the credentials inside of our Auth0 React app, the URLs updated inside of our Auth0 application, we're ready to test this out. So I'm going to go back to my app here that's running and try to log in. Now I've already created this user. So it's asking me permissions to view my profile and email going to accept that. And then you can see that I successfully log in and authenticate. And I'm even able to see my profile and a little bit about myself. Now the next part here, let's actually set up multi factor authentication with Auth0 Guardian. Before we go to our dashboard to flip the switch for this, let's first talk about Auth0 Guardian. So Guardian is a mobile app that lives on a user's device, typically a phone or a tablet. And it delivers push notifications so that users can instantly accept or deny access via the push of a button. It can also generate a one time password. If that factor is preferred, instead of integrating with each vendor specific push notification service, you'll find the Guardian mobile app in both iOS and Android. And the technology is also available as Guardian SDK, which can be used in custom mobile applications to act as a second factor push responder. It's really simple to enable this inside of your tenant. Go back to your dashboard and then on the security tab, go ahead and click on multi factor Auth. As you scroll down, you can see all the different factors involved, but we're looking for this Auth0 Guardian. By simply toggling this on, this is going to enforce that all your users use Auth0 Guardian to authenticate within your app. Notice that you can also build your own multi factor authentication app with the control on look and feel using the Guardian SDK. I'm not going to get into that. We're just going to enable this and use the Guardian mobile app with this option enabled back onto these first screen past the factors. We didn't actually set how often we want to enforce this multi factor authentication. There is the never option, the adapted MFA, which we'll talk about in a second and the always, which is pretty self explanatory always requiring multi factor authentication. This use adaptive MFA basically requires a additional factor if the login appears to be high risk. I'm just going to use always perfect. Now if we scroll to my app and log out and then try to re log in, we're going to enter in the same username and password that last time and press continue. Though this time unlike last time, you can see that we get a new modal here that's telling me to download the Auth0 Guardian mobile app from either the app store or Google Play. So take a moment and go ahead and do that. I already have the Guardian app on my phone, so I'm going to push continue. The next thing is going to register your phone with your account here. So go ahead and open up the Guardian app on your mobile device, press on the plus sign in the corner and then you're going to scan the QR code. Once it scans and registers on your phone back on the website, you'll see a recovery code that's going to be the users to keep in case they need to log in without a phone around. Copy this somewhere safe and then you can see we are successfully authenticated. Now if we log out and then to retry to log in now that we have Guardian installed, typing in the same username and password, you'll notice that now it's sent a notification to our iPhone device. So back on my phone, you'll see I get this push notification, the information about where I'm trying to sign in, I press allow and then back on the site, it successfully completes the authentication flow. So hopefully you see now how easy it is to turn on multi-factor authentication using the OZio Guardian app. I hope you enjoyed this video. Please check out the video notes and links below for more information.