# Identification, Authentication and Authorization

Identification occurs when a user claims their identity,&#x20;

authentication occurs when a user proves their identity,&#x20;

authorization occurs when correct identification and authentication have been done and a user needs access to resources for which he has specific permissions which are otherwise restricted for unauthenticated users.

Example, in an ID card: ID number provides identification; using the ID card with password to log in to the employee portal provides authentication; and finally, using the ID card (which, lets say belongs to the data center admin) to get access to the data center's server rack provides authorization since that permission is only with the DC admin.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://hexisanoob.gitbook.io/hexisanoob/security-basics-notes/identification-authentication-and-authorization.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
