Our Ultimate Guide to Authentication: Types, Mechanisms, Forms, Protocols and More