The do’s and don’ts of implementing an authentication process that provides strong security without irritating your users.