All authentication systems have some common properties. The properties compiled here have been chosen because they pertain more to the networking aspects of these authentication systems than do some others.