External Authentication Methods Introduction