- Enhance or customize the login experience (for example, add a logo or login message).
- Collect and update user data (for example, request an email address, phone number, or mailing address).
- Interact with users, and ask them to perform an action (for example, complete a survey or accept terms of service).
- Connect to an external identity service or geo-fencing service, and collect or verify user information.
- Enforce strong authentication (for example, implement a two-factor authentication method using hardware, SMS, biometric, or another authentication technique).
- Run a confirmation process (for example, have a user define a secret question, and validate the answer during login).
- Create more granular policies (for example, set up a policy that sends a notification every time a user logs in during non-standard working hours).