Appgate SDP allows your security team to put security policies in place requiring you to confirm your identity using MFA at sign-in. This can be when trying to access certain applications or at particular times.
Unlike a static password that can be guessed or stolen, Multi-Factor Authentication ensures stronger security by requiring separate pieces of evidence to verify who you are. In this case, the first piece of evidence is “knowledge” (something you know, like your static login password), and the second piece of evidence is “possession” (something you have, like your phone). An OTP for instance, can be generated by a smartphone app, sent by SMS, or come from some sort of token.
If you don’t want to do this at the current time, just close the window, the window will re-open when you need it later.
User Interactions
The section below explains what happens when you’re prompted for different types of MFA.
Using an Authenticator App
To verify your identity with an authenticator app:

Open the “Authenticator” app on your mobile device. It will automatically generate a six-digit one-time password (OTP).
Type the six-digit OTP into the popup window (no spaces). The six-digit code generated by the “Authenticator” app is valid for 90 seconds. If you type it incorrectly, or the code on your mobile expires, simply type in the next code that is displayed.
Click Submit or Connect to continue.
If this the first time you have used the authenticator app, you will be required to go through a short set up process. For more help with this, go to Using the Built in OTP.
Using an alternative OTP solution such as a token
Generate or find the next OTP.
Type the OTP into the popup window (no spaces).
Click Submit or Connect to continue.
Using FIDO tokens

Follow the instructions for your FIDO hardware. This will involve inserting the FIDO key and then touching it while it is flashing. After a short delay you should be able to access the resource you require.