Identity management, authorization techniques, SSO, and access control monitoring are all forms or methods of protecting data from unauthorized or underprivileged users. Authorization techniques may include Something you know, something you are, something you have such as things like passwords or passphrase possibly keys or fingerprint scanners, which can lockdown data on a device or locations like server rooms.
SSO is a method of a single time sign on, an example may be social media like facebook, which only requires you to authenticate yourself a single time (unless logged out)
Access control monitoring is a method of keeping track of a users access history.