Evaluate user authentication from user--machine, machine--user perspective.
We should evaluate purely password-based authentication, two-factor authentication and key-based authentication (e.g. BankID), both from a security and a usability perspective.