The image shows approval rekey screen.

The application will request approver for few critical field values as an authorization step. If the values captured match with the values available in the screen, system will allow user to open the transaction screens for further verification.