Authentication is a fundamental action of any access-control system and one of the primary reasons for digital identity in the enterprise. Authentication verifies that an entity can lay claim to a particular identity, and that forms the basis for all future authorization and access-control determinations. Now that we're aware of how credentials can be authenticated, let's turn to how they can be used to control access to resources and actions.