[This is preliminary documentation and subject to change.]
Vendors should use the following structure types for authentication protocols and authentication providers.