The process typically involves the following steps:
The user attempts to log in or perform a sensitive action such as changing their email address. The system sends an OTP or verification code to the user's registered mobile number. The user enters the received code into the system. If the code matches, the user is granted access or allowed to complete the action.