Typically used for login, this monitoring is used to, in some specific scenarios, do two-step verification. A application makes a prerequisite and a postrequisite, using the response from the first request to completing the second request at a URL and check whether the digital product is up or down, using several flows.


Scroll to Top