<P> In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves . The user credentials are typically some form of "username" and a matching "password", and these credentials themselves are sometimes referred to as a login, (or a logon or a sign - in or a sign - on). In practice, modern secure systems also often require a second factor for extra security . </P> <P> When access is no longer needed, the user can log out (log off, sign out or sign off). </P> <P> Logging in is usually used to enter a specific page, which trespassers cannot see . Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site . Logging out may be performed explicitly by the user taking some actions, such as entering the appropriate command, or clicking a website link labeled as such . It can also be done implicitly, such as by the user powering off his or her workstation, closing a web browser window, leaving a website, or not refreshing a webpage within a defined period . </P> <P> In the case of websites that use cookies to track sessions, when the user logs out, session - only cookies from that site will usually be deleted from the user's computer . In addition, the server invalidates any associations with the session, making any session - handle in the user's cookie store useless . This feature comes in handy if the user is using a public computer or a computer that is using a public wireless connection . As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer, instead one should explicitly log out and wait for the confirmation that this request has taken place . </P>

Verification of a log in name and password is known as