6.0 Configuring Authentication Methods