Access authorization

restricts access to or from a computer, server, website, or network to a group of users through the application of authentication systems. These systems can protect either the whole computer, such as through an interactive logon screen, or individual services, such as an FTP server. Many methods are available for identifying and authenticating users, such as passwords, identification cards, smart cards, and biometric systems.[1]

References[edit | edit source]

See also[edit | edit source]

Community content is available under CC-BY-SA unless otherwise noted.