How perimeter authentication is performed.