4.1.1 Discovery Example: Request

The following sections are examples of requests using different authentication methods.