If you have a public key infrastructure, you can deploy certificates
to enable authentication without users having to manually respond
to login challenges (see
Certificate
Management). Alternatively, or in addition to certificates,
you can implement interactive authentication, which requires users
to authenticate using one or more methods. The following topics
describe how to implement, test, and troubleshoot the different
types of interactive authentication: