Mechanisms exist to require individuals to be authenticated with an individual authenticator when a group authenticator is utilized.
Mechanisms exist to require individuals to be authenticated with an individual authenticator when a group authenticator is utilized.