The authentication flow of the strategy.
This method receives the Request from the authenticator we want to authenticate.
At the end of the flow, it will return a the User data to be used by the application.
Protected
authorizationReturn extra parameters to be included in the authorization request.
Some OAuth 2.0 providers allow additional, non-standard parameters to be included when requesting authorization. Since these parameters are not standardized by the OAuth 2.0 specification, OAuth 2.0-based authentication strategies can override this function in order to populate these parameters as required by the provider.
The name of the strategy. This will be used by the Authenticator to identify and retrieve the strategy.