How Do The Authentication Methods Work