Techniques for authentication are provided. A first authentication request
transformed with a private portion of a first type split private key is
received. A first user is authenticated for a first level of network
access based upon the first request being transformed with the first type
of split private key. A second authentication request that is transformed
with a private portion of a second type private key is also received. A
second user is authenticated for a second level of network access based
upon the second request being transformed with the second type of split
private key.