Via a middleware which handles an upstream proxy dictating the authenticated user Via a third party service which implements an authentication pipeline This documentation describes the latter, which ...