This document discusses different types of electronic identities and attributes used for authentication, authorization, and access across systems. It covers: - Basic username/password and file permission models for direct local access - More advanced directory services like LDAP, Kerberos, and PKI for system-level access across networks - How public key infrastructure uses certificates to authenticate parties, authorize access, and broker digital assets between organizations in a verifiable way similar to state-issued IDs - The use of certificates to establish unique identities, security features, context, and limitations for both people and systems seeking to collaborate or provide access to resources.