Prevent identity attacks with additional levels of authentication
Implement a variety of different factors for authentication across usability and assurance levels:
Based on something the user knows.
Based on something the user has.
Based on something the user is.