A login is the authentication process by which a user verifies their identity to gain authorized access to a system, application, or network resource.

A login is the process by which a user identifies and authenticates themselves to gain access to a digital system, application, or network resource. This typically involves providing a set of credentials — most commonly a username paired with a password — which the system verifies against stored records. Upon successful authentication, the user is granted a secure session with specific access rights and privileges aligned to their verified identity, enforcing the principle of least privilege and other security policies.

Login is a foundational security control within Identity & Access Management (IAM) and serves as the primary barrier against unauthorized access, data breaches, and malicious activity. It ensures the confidentiality, integrity, and availability of information assets by allowing only authorized individuals to interact with sensitive data and functionalities. Modern login mechanisms often extend beyond simple passwords to include multi-factor authentication (MFA), biometrics, single sign-on (SSO), and passwordless methods to strengthen the overall security posture of an organization.