Summarization could include
- identifying authentication methods (e.g., technologies)
- time-based one-time password (TOTP)
- hash-based message authentication code (HMAC)/hash-based one-time password (HOTP)
- short message service (SMS)
- token key
- static codes
- authentication applications
- push notifications
- smart card authentication
- biometrics
- multifactor authentication (MFA) factors and attributes
- authentication, authorization, and accounting (AAA)
- cloud vs. on-premise requirements.