To use Step-Up authentication, the login application needs the following information (configuration):
- Required Roles: roles required to access a target application.
- Step-Up Rules: rules defining by what authentication means a user can acquire what role.