In one example in accordance with the present disclosure, a method is described. According to the method, a computing device acquires data related to a variable data component. The computing device then authenticates at least one of the computing device and the proper user of the computing device. Upon authentication of the computing device and/or proper user of the computing device, a downstream workflow is authorized. The downstream workflow is defined by the data associated with the variable data component and enabled via the authentication of the computing device and/or proper user of the computing device.