Is a broad IT security and administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system, by associating user rights and restrictions with the established identity. In term of IT security it enables individuals to access the right resources at the right times for the right reasons.