This document discusses authentication strategies for native mobile applications. It recommends using OAuth 2.0 with an authorization code grant to obtain access tokens securely without embedding credentials in the app. The key steps are: 1) opening a browser to request authorization; 2) handling the callback to exchange the authorization code for an access token; and 3) using the token to access APIs securely on behalf of the user. Authentication can leverage single sign-on or stored user identities.