[This is preliminary documentation and subject to change.]
Vendors should implement the following functions for authentication protocols and authentication providers.