One or more computing devices, systems, and/or methods for securing resources are provided. For example, a request to access resources may be received from a first device. A verification process may be performed using a second device, to verify an identity associated with the request. The first device may be provided with access to the resources. The access may be a first level of access. It may be determined that a distance between the first device and the second device is greater than a threshold distance. Responsive to determining that the distance is greater than the threshold distance, the access to the resources may be modified to a second level of access. The second level of access may be different than the first level of access.