Security and other teams are working to implement two step authentication across the foundation. They are aware that there are usability issues with end users using two step auth.
To get to the goals of this research define a methodology, the first step will be meeting with Security team to discuss.