Guidelines for secure authentication to the cloud

Summary
Detailed documentation of enhancements and improvements w.r.t. authentication mechanisms