Identifying Users
Next: Physical Keys
Up: General Issues
Previous: General Issues
Generally, a user's first activity when starting a session with
a secured computer system is identifying himself/herself to the system.
The most common ways to identify and authenticate users are by the
use of physical keys, account names and passwords, and biometric checks.
John Barkley
Fri Oct 7 16:17:21 EDT 1994