Chapter 7. Configuring identity providers