Chapter 4. Setting up an authentication method for RHOSP