NONE

No authentication is required to access the cryptographic keys. Keys are accessible without user verification. This option provides the least security but maximum convenience.