Server-To-Server Authentication Schemes
A tour of motivations, techniques, strengths, and weaknesses.