We have very strict auditing requirements and want to be able to correlate every action our system takes on behalf of the user to a specific authentication o