Configuring user authentication alternatives

If you encounter any issues with the recommended procedures for configuring user authentication, see the following topics for support.