Explore three different ways to integrate Descope authentication into your application. Each method offers unique benefits for different use cases.