9  Authentication and authorization

9.1 Important terminology

9.2 Encrypted environment variables

9.3 Federated auth/Token exchange