Answer: Identification: For access control to be effective, it must provide some way to identify an individual. ... 
Authentication: Identification requires authentication. ... 
Authorization: The set of actions allowed to a particular identity makes up the meat of authorization.
Step-by-step explanation: