Authentication Mechanisms - What you need to know about the top 6