Chapter 1. Overview of authentication and authorization