The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
Requiring individuals to use individual authenticators as a second level of authentication helps organizations to mitigate the risk of using group authenticators.