Access tokens are generated in accordance with organization-defined identification and authentication policy.