Access control

Control who has access to the system and to what parts of the system

Authentication

Determine that the user is who they claim to be

Single Sign-on

SSO

Federated Identity

Authorization

Describe who has access to what

Access Control List

ACL

Role-based Access Control

RBAC