Mechanisms exist to require individuals to be authenticated with an individual authenticator when a group authenticator is utilized.
Does the organization require individuals to be authenticated with an individual authenticator when a group authenticator is utilized?