Authentication Guide

Two auth methods, token lifecycle, MFA setup, and security challenges.