Database Security Guide Managing Strong Authentication Part V Managing Strong Authentication Part V describes how to manage strong authentication.