An act by which a system entity establishes a session in which the entity can use system resources. (See: principal, session.)
An act by which a system entity establishes a session in which the entity can use system resources. (See: principal, session.)
An act by which a system user has its identity authenticated by the system. (See: principal, session.)
Usage: Usually understood to be accomplished by providing an identifier and matching authentication information (e.g., a password) to a security mechanism that authenticates the user's identity; but sometimes refers to establishing a connection with a server when no authentication or specific authorization is involved.
Derivation: Refers to "log" file, a security audit trail that records (a) security events, such as the beginning of a session, and (b) the names of the system entities that initiate events.