Access control based on the identity of the user (typically relayed as a characteristic of the process acting on behalf of that user) where access authorizations to specific objects are assigned based on user identity.
						                            Source(s):
						                            
								                            
                                                                    CNSSI 4009-2015