When creating a login wall bypass we now validate the steps and login credentials set in the login wall bypass and notify the user if the bypass failed.
Upon configuration, the system will immediately validate the configured steps using the specified login credentials. Users will be promptly informed of the success or failure of the bypass, ensuring that audits are executed as expected.