broad term used for authentication and authorization systems
This term is broadly used to cover issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.) detailed reading