This page has been moved to /docs/guides/best-practices/what-are-best-practices-for-identifying-users