By using Authentication Pipeline we can write our own custom authentication logic. […]