Appearance
Multiple methods are used to identify and authenticate personnel to systems, applications and data repositories.