A straightforward explanation of authentication. Controlling access to information systems requires two distinct activities: determining the identity of the end user (the identification phase) and ...