6.17 Other Authentication Types