A method of computer access control that a user can pass by successfully presenting authentication factors from two or more independent credentials: what the user knows (password), what the user has (security token), and what the user is (biometric verification).
a) Single sign-on
b) Multi-factor authentication
c) Role-based access control
d) Least privilege