Access control includes identification, authorization, authentication, access approval, and audit.
Authorization involves the act of defining access-rights for subjects. An authorization policy specifies the operations that subjects are allowed to execute within a system.
- Rule-based access control
- Role-based access control
- Attribute-based access control
- Context-Based Access Control
In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.