You are here

Authentication chain functions

The functions of the chain are composed in two different ways: chained functions and pass-through functions.