20.3. Authentication Methods

The following sections describe the authentication methods in more detail.