Watch this video on YouTube
What is the FIRST step that should be taken when addressing identification and authentication failures?