Introduction - If you have any usage issues, please Google them yourself
Throughout this book, authentication, authorization, and access control are incorporated into the
concept of identity. Although these concepts are distinct, they all pertain to each individual user of the
network---be it a person or device.