1. Authenticate users
  2. Authorize what resources they can access
  3. Log all actions for accountability

Implementations