5 Using a Custom Authentication Module Related Topics Overview Use-Case Examples and Limitations Prerequisites Design and Coding Considerations Deploying the Custom Authentication Module