Chapter 26. Authentication and Interoperability