An authentication method must be chosen. Examples of valid auth methods include Anonymous, Cert, Kerberos, NTLM, or PSK. ...