Verifies the identity of a user, device, or system
Typically involves validating user credentials against an authorized user database