authentication techniques

authentication techniques