What is claimed is:1. A method for variable-step authentication at a server, comprising:receiving, from a first communication device associated with a first participant, a request for a communication session involving the first communication device in a controlled environment and a second communication device located outside of the controlled environment, wherein the second communication device is associated with a second participant;determining a first trust level of the first participant, wherein the first trust level indicates a first number of authentication steps to be successfully verified in order for the first participant to participate in the communication session;determining a second trust level of the second participant, wherein the second trust level indicates a second number of authentication steps to be successfully verified in order for the second participant to participate in the communication session;transmitting, by the server to the first communication device, a first authentication procedure, wherein the first authentication procedure is generated based on the first trust level, and wherein a first authentication step of the first number of authentication steps comprises a first type of authentication step and a second authentication step of the first number of authentication steps comprises a second type of authentication step;transmitting, by the server to the second communication device, a second authentication procedure, wherein the second authentication procedure is generated based on the second trust level; andpermitting communications over the communication session between the first communication device and the second communication device upon successful verification of responses to the first authentication procedure and the second authentication procedure.2. The method of claim 1, wherein the first authentication procedure includes the first number of authentication steps indicated by the first trust level and the second authentication procedure includes the second number of authentication steps indicated by the second trust level.3. The method of claim 1, further comprising:receiving, from the first communication device, responses to the first authentication procedure; andverifying the responses prior to establishing the communication session.4. The method of claim 3, wherein the first authentication procedure comprises the first authentication step and the second authentication step, and wherein receiving the responses to the first authentication procedure includes:receiving a first response to the first authentication step; andreceiving a second response to the second authentication step.5. The method of claim 1, wherein the first number of authentication steps is different from the second number of authentication steps.6. The method of claim 1, wherein the communication session includes a real-time communication.7. The method of claim 6, further comprising:establishing, by the server, the communication session between the first communication device and the second communication device, wherein the first authentication procedure and the second authentication procedure are transmitted over the communication; andpreventing, by the server, other communications from being transmitted over the communication session until the server successfully verifies the responses to the first authentication procedure and the second authentication procedure.8. The method of claim 6, wherein the real-time communication is one of a telephone call, a video conference call, or a conference call.9. A server for performing variable-step authentication, comprising:a memory; anda processor coupled to the memory, the processor configured to:receive, from a first communication device associated with a first participant, a request for a communication session involving the second communication device in a controlled environment and a first communication device located outside of the controlled environment, wherein the second communication device is associated with a second participant;determine a first trust level of the first participant, wherein the first trust level indicates a first number of authentication steps to be successfully verified in order for the first participant to participate in the communication session;determine a second trust level of the second participant, wherein the second trust level indicates a second number of authentication steps to be successfully verified in order for the second participant to participate in the communication session;transmit, by the server to the first communication device, a first authentication procedure, wherein the first authentication procedure is generated based on the first trust level, and wherein a first authentication step of the first number of authentication steps comprises a first type of authentication step and a second authentication step of the first number of authentication steps comprises a second type of authentication step;transmit, by the server to the second communication device, a second authentication procedure, wherein the second authentication procedure is generated based on the second trust level; andpermit communications over the communication session between the first communication device and the second communication device upon successful verification of responses to the first authentication procedure and the second authentication procedure.10. The server of claim 9, wherein the first authentication procedure includes the first number of authentication steps indicated by the first trust level and the second authentication procedure includes the second number of authentication steps indicated by the second trust level.11. The server of claim 9, wherein the processor is further configured to:receive, from the first communication device, responses to the first authentication procedure; andverify the responses prior to establishing the communication session.12. The server of claim 11, wherein the first authentication procedure comprises the first authentication step and the second authentication step, and in receiving the responses to the first authentication procedure, the processor is further configured to:receive a first response to the first authentication step; andreceive a second response to the second authentication step.13. The server of claim 9, wherein the first number of authentication steps is different from the second number of authentication steps.14. The server of claim 9, wherein the communications are real-time communications.15. The server of claim 14, wherein the processor is further configured to:establish, by the server, the communication session between the first communication device and the second communication device, wherein the first authentication procedure and the second authentication procedure are transmitted over the communication session; andprevent, by the server, other communications from being transmitted over the communication session until the server successfully verifies the responses to the first authentication procedure and the second authentication procedure.16. A non-transitory computer-readable medium having instructions stored therein, which when executed by a processor in a monitoring center of a controlled environment cause the processor to perform operations, the operations comprising:receiving, at a server from a first communication device associated with a first participant, a request for a communication session involving the first communication device in the controlled environment and a second communication device located outside of the controlled environment, wherein the second communication device is associated with a second participant;determining a first trust level of the first participant, wherein the first trust level indicates a first number of authentication steps to be successfully verified in order for the first participant to participate in the communication session;determining a second trust level of the second participant, wherein the second trust level indicates a second number of authentication steps to be successfully verified in order for the second participant to participate in the communication session;transmitting, by the server to the first communication device, a first authentication procedure, wherein the first authentication procedure is generated based on the first trust level, wherein a first authentication step of the first number of authentication steps comprises a first type of authentication step and a second authentication step of the first number of authentication steps comprises a second type of authentication step;transmitting, by the server to the second communication device, a second authentication procedure, wherein the second authentication procedure is generated based on the second trust level; andpermitting communications over the communication session between the first communication device and the second communication device upon successful verification of responses to the first authentication procedure and the second authentication procedure.17. The non-transitory computer-readable medium of claim 16, wherein the first authentication procedure includes the first number of authentication steps indicated by the first trust level and the second authentication procedure includes the second number of authentication steps indicated by the second trust level.18. The non-transitory computer-readable medium of claim 16, the operations further comprising:receiving, from the first communication device, responses to the first authentication procedure; andverifying the responses prior to establishing the communication session.19. The method of claim 1, wherein the first type of authentication step and the second type of authentication step are different from each other and wherein the first type of authentication step and the second type of authentication step comprise one of a username/password challenge, an SMS response challenge, a challenge question, an email response challenge, and a biometric challenge.20. The method of claim 1, wherein steps of the first number of authentication steps are randomly selected to be included in the first authentication procedure.