Watch this video on YouTube
A user attempts to access a company network folder. Which security concept determines if the user is who they claim to be?