Username and Password Authentication
Perimeter Authentication
How is Perimeter Authentication Accomplished?
Identity Assertion Service