What is the correct way to implement a change-of-email request flow?

I am currently implementing a change-of-email request flow for a web service without MFA. My initial approach is to consult the current OWASP Guide for such a flow. In reading the document, I’ve realized this is quite different from the f… Continue reading What is the correct way to implement a change-of-email request flow?