This document introduces the Authenticated Network Architecture (ANA) approach for network security. ANA is based on authenticating all network users and associating each with specific access entitlements. For example, guests only get internet access, contractors access discrete resources, and employees broader network access. The document outlines how ANA provides a more dynamic approach than previous security designs by authenticating and authorizing all users. It discusses best practices, considerations for deployment, and how to migrate existing designs to the ANA framework. The goal of ANA is to improve security by centrally managing user identities and access policies across the distributed enforcement points in modern complex networks.