The process of verifying the identity of a user, device, or other entity in a computer system, often as a prerequisite to granting access to resources in the system. A recipient of an authenticated message can be certain of the message's origin (its sender). Authentication is presumed to preclude the possibility that another party has impersonated the sender.