What is it?
The implementation of policies, practices, and technology to enable positive identification of people, devices, and applications.
Why is it important?
Understanding authentication is critical for establishing a secure environment because you must reliably know the identity of the people, devices, and applications accessing your resources in order to properly govern access and permissions.