How businesses can choose open source authentication solutions wisely