Identity management, authentication techniques, single sign on, and access control monitoring all are used in protecting a network from unauthorized users from gaining access to a network, along with assigning a unique identifier to users that is used to authorize access privileges. The mentioned terms strengthen authentication of user access to a network more than just username and password, using something the user would only know or be assigned like an authenticator, along with monitoring of user activity if any unauthorized users slip by.