encryption integrity login authentication portal access control events instant messaging network authentication fingerprint cryptography authentication security non repudiation access control overview identity management security business