How Device-Based Authentication Works For Customer Identity Management