An authentication process, which ensures that authorized users are assigned confidential user identification and passwords. Another type of authentication is biometrics.
Role-based security methods may be employed to ensure user or viewer authorization. For example, data access levels may be assigned to specified department staff.
Access controls ensure that user actions remain within their roles. For example, if a user is authorized to read but not write data, defined system controls may be integrated.