steps for handling discrepancies in authentications