Authentication
Most of the applications require that a user authenticates himself in some way, so as to have access to data associated with him or to his some other private contents available on the application. Two Factor authentication facility which includes security questions are available to validate different transactions. This list of security questions which can be added or modified, further to be available to the customers to establish authenticity. These security questions are asked to the user for proper verification and when the validation is stablished, then only user is able to access the content. Administrators can also define application roles and map them to different transactions for different access points available.
Also they can define workflows and rules for approving different transactions. And the event details are maintained under Audit logs for additional information required by Administrators.