It is a process in which the credentials provided are compared to those on file in a database of operating system or within an authentication server, if the credentials match, the process is completed and the user is granted authorization for access.