This illustration shows the authentication scheme that you must select for the authentication policy that protects the resources.