Credential
Authentication
Two-factor authentication
Authorization
Login
Identity assurance
Electronic authentication
Security
Identity management
Computer security