What are three valid method of user mapping? (Choose three)