A computer system to authenticate users of vendors supplying services
and/or products to the users, the system having programmed processors
providing authentication rules, authenticating users according to the
authentication rules responsive to user authentication requests,
configuring the authentication rules in real-time, thereby allowing
real-time customization of the system, providing multi-factor user
authentication processes, using any data sources providing information
about and/or known to the users to authenticate the users, thereby
providing a data agnostic system, and authentication strategies
correspond to the authentication rules, thereby allowing the system to
support authentication strategy experimentation.