...
What if a situation exists that requires 2FA authentication, but for technical or other reasons it is not currently possible to implement the requirement?
A temporary exception may be requested by submitting a Security Exception Request Form. Exceptions must be justified and include the following elements:
...
This content has moved.
Please see: https://security.utexas.edu/iso-policies/approved-2fa-authentication-methods