An organization must verify the identity of a user seeking access to a system Which aspect of cloud identity management does this action describe?
Auditing
Authentication
Authorization
Encrypting
Submit