diff --git a/adminforth/documentation/docs/tutorial/08-Plugins/02-TwoFactorsAuth.md b/adminforth/documentation/docs/tutorial/08-Plugins/02-TwoFactorsAuth.md
index 819938e7..eb0ade80 100644
--- a/adminforth/documentation/docs/tutorial/08-Plugins/02-TwoFactorsAuth.md
+++ b/adminforth/documentation/docs/tutorial/08-Plugins/02-TwoFactorsAuth.md
@@ -229,7 +229,7 @@ So such users will have suggestion to setup 2FA, but will be able to skip it wit
You might want to to allow to call some custom critical/money related actions with additional 2FA approval. This eliminates risks caused by user cookies theft by some virous/doorway software after login.
-To do it, first, create frontend custom component which wraps and intercepts click event to menu item, and in click handler do a call to `window.adminforthTwoFaModal.getCode(cb?)` frontend API exposed by this plugin. This is awaitable call wich shows 2FA popup and asks user to authenticate with 2nd factor (if passkey is enabled it will be suggested first, with ability to fallback to TOTP)
+To do it, first, create frontend custom component which wraps and intercepts click event to menu item, and in click handler do a call to `get2FaConfirmationResult` frontend API exposed by this plugin. This is awaitable call wich shows 2FA popup and asks user to authenticate with 2nd factor (if passkey is enabled it will be suggested first, with ability to fallback to TOTP)
```ts title='/custom/RequireTwoFaGate.vue'
@@ -239,6 +239,9 @@ To do it, first, create frontend custom component which wraps and intercepts cli
@@ -333,20 +335,19 @@ Frontend (Save Interceptor component injected via pageInjections):
```vue title='/custom/SaveInterceptor.vue'