Provided are methods for authenticating the identity of a user for use in
a distributed computer network including multiple sets of access
credentials. A user request, including the user's input credentials, is
received, and then compared simultaneously to multiple sets of access
credentials in order to verify the user's input credentials. When the
user's input credentials are verified, the appropriate level of access
authority is then determined, and proper access is granted to the user.