6  Authentication and authorization

6.1 Important terminology

6.2 Encrypted environment variables

6.3 Federated auth/Token exchange