Chapter 5. Additional configuration for identity and authentication providers