Mechanisms exist to verify the identity of a user before issuing authenticators or modifying access permissions.