Section 1.5.1, Authentication Method
Section 1.5.2, Authentication Chain
Section 1.5.3, Authentication Event
Section 1.5.4, Endpoint
Section 1.5.5, Tenant