In accordance with certain aspects of the present invention, improved
methods and arrangements are provided that improve access control within
a computer. The methods and arrangements specifically identify the
authentication mechanism/mechanisms, and/or characteristics thereof, that
were used in verifying that a user with a unique name is the actual user
that the name implies, to subsequently operating security mechanisms.
Thus, differentiating user requests based on this additional information
provides additional control.