A cryptographic mechanism that uses public key and private key encryption to validate the identity of the user, device, or machine before granting access to critical resources, networks, and applications.