Authentication methods Once the factors and means have been defined, a method needs to be chosen. This is the framework for determining whether it has been successful and whether access is authorized or denied.