Authentication flows that adapt verification requirements based on detected risk signals and anomalies.