20.8.13 Authentication Methods Used

This graph displays the name and number of the frequently used contracts.

This graph helps in determining the most commonly used contracts that are used for authentication.