Local verification on an authenticator proving the authorized user is present. Methods include PIN, fingerprint, or face recognition on the device.