How authentication is used: Since a large part of the entire networking process involves one computer requesting something from another computer. A Web page client might ask for a Web page, for example, or a Common Internet File System (CIFS) client might ask a file server for access to a folder. A computer far away might ask another computer for access to a private network. Whatever the case, it is important to carefully assign levels of access to your resources, this process is known as authorization, and an access control list can help define how to assign levels of access.