The chapter gives a brief overview of the authentication protocols and how the Keycloak authentication server and the applications it secures interact with these protocols.