You can use one of methods listed above alone, or a combination of mutual authentication with a user-based method such as the following:
Mutual authentication and federated authentication
You can use one of methods listed above alone, or a combination of mutual authentication with a user-based method such as the following:
Mutual authentication and federated authentication