Authentication Scenarios

Each of the supported user authentication scenarios is described in terms of packet flow in the following sections.