How the login screen works, the precedence of each auth method, keys in the config file, permission scopes