The process of determining for example via access control that a requestor is allowed to receive a service or perform an operation.
The limiting of usage of information system resources to authorized users, programs, processes or other systems, formally described as controlling usage by subjects of objects.