Protecting against Synthetic Identity

When probabilistic determinations won’t suffice, implement identity proofing in the authentication flow to trust but verify.