Enable authentication via actions. Users can first authenticate (e.g., with a postal code and e-mail address) using one action, and then use the approved authentication to perform other secure actions, like retrieving data or making changes. This adds an extra layer of security and simplifies workflows for sensitive tasks.