Identifying Users



next up previous contents
Next: Physical Keys Up: General Issues Previous: General Issues

Identifying Users

  Generally, a user's first activity when starting a session with a secured computer system is identifying himself/herself to the system. The most common ways to identify and authenticate users are by the use of physical keys, account names and passwords, and biometric checks.



John Barkley
Fri Oct 7 16:17:21 EDT 1994