Common ExamplesAllow Access Just From a City or Country →Block Access From a Specific Type of Security Key Device →Block Access Out of Working Hours for Specific Group of Users →Restrict Access From a Range of IP Addresses →Restricting Organization’s Security Keys on Some RPs (Relying Parties) →Tying a Shared Device to a Single User Account →