This document discusses options for implementing two-factor authentication for access to sensitive PeopleSoft data and transactions. It describes how GreyHeller can facilitate redirecting users to a third-party authentication solution or provide its own interface for generating and validating authentication tokens. It also explains how GreyHeller allows inheriting existing two-factor desktop authentication rules for mobile access and provides the ability to dynamically challenge users and generate one-time passwords for additional authentication from untrusted locations without requiring customizations to PeopleSoft transactions.