How Can We Help?
Access control based on the identity of the user (typically relayed as a characteristic of the process acting on behalf of that user) where access authorizations to specific objects are assigned based on user identity.
SOURCE: SP 800-53; CNSSI-4009