Rule-based authentication use cases