Beyond basic username and password credentials, the RFP is likely to ask for one or more of several other authentication arrangements or methods, including methods that allow nuanced access and considerations that tie spend management or purchasing permissions to user authentication.