In addition to regular authentication via username/password or SSO, a second layer of security can be configured, permitting access only if: