Users and Identities

What is the difference between functional users and real users?

Security trade-off between functional and real users?

Which users need interactive login?