Mechanisms exist to allow individuals to utilize alternative methods of authentication under specific circumstances or situations.
Does the organization allow individuals to utilize alternative methods of authentication under specific circumstances or situations?