Secure the user by considering security aspects of mobile device and based on this device information, decide to authenticate the user with minimal steps, improving the user experience or step up or even block access if the device is in an unsecured state.
Refer the docs for more information.