The strategy value depends on the object's identifier value. Each authentication identifier supports different verification strategies.