- For the most part, any name can be used, so long as each authentication source has a different identifier.
- In most cases there will be only one authentication source used.
+ For the most part, any name can be used, so long as each authentication
+ source has a different identifier. In most cases there will be only one
+ authentication source used.