Security deserves its own special chapter. In this chapter we outline how authentication and authorization are handled for the various configurations possible.