You are the IT administrator for a medium-sized organization. You want to implement Multi-Factor Authentication (MFA) but are concerned about the inconvenience it might cause to some users. Which MFA method would allow you to apply more granular control based on specific conditions such as user location or device state?