A. Authentication does not require an authentication mechanism
B. To enable authentication on a sharded cluster, you must enable authentication individually on each component of the cluster
C. The content of the key file must be the same on all cluster members
D. All of the mentioned