Step 4: Specifying Authentication Types