Security Configuration Guide Using a Custom Authentication Module 5 Using a Custom Authentication Module Related Topics Overview Use-Case Examples and Limitations Prerequisites Design and Coding Considerations Deploying the Custom Authentication Module