The ability to uniquely prove who a user of a system or application is, to enforce access control and establish accountability.