Chapter 6. Understanding identity provider configuration