Chapter 2. Understanding authentication