The following sections outline requirement information specific to the Legacy Authentication Methods.