Security and authentication

Compare authentication providers, find required configuration, and jump to CLI setup and authorization guidance.