Watch this video on YouTube
What cloud computing security concept is implemented to verify the identity of a user, system, or service?