No matter which access control scheme you use (DAC, MAC, and so forth), the basic two-step process to log into the network is always required. Every authorized user has (or should have) their own user account. To use the IT system, the user must first login. The two-step login process is for you as a claimant to claim an identity (identification) and then prove that you are responsible for that identity (authentication). There are at least three important aspects to this two-step process that require investigation:
The number and type of factors reflect the strength of the authentication process. ...