Article 2. Credential Types, Authorizations, and Requirements