External Authentication: An Overview