Toggle navigationAboutRelease and supportSystem architecturesGetting startedRequirements and limitationsInstallation and upgradeConfigurationUse casesGateway deploymentSession handlingTrafficFilteringAuthenticationOIDC authenticationOIDC step-up authenticationObservabilityToolingTroubleshooting and supportReference documentationUse casesAuthenticationAuthenticationThis chapter contains authentication use cases.Chapter contentOIDC authenticationOIDC step-up authentication