Method and systems are disclosed for enabling a computer system to
generate a request that includes an instruction identifying the
authentication method or methods to be used when authenticating a subset
of the client computer systems or users network connected to a server
computer system. The subset of client computer systems or users may
include as little a single computer system or user. The request is then
transmitted to the server computer system. When receiving subsequent
requests for service from any of the subset of client computer systems or
users, the server computer system will refer to the information in the
instruction to determine which authentication methods are acceptable in
authenticating the client computer system or user.