Identification, Authentication & Authorization

An explanation with daily life examples