An application considers a user authenticated when their identity has been successfully validated against a trusted store. Such trusted stores can eitherĀ be any kind of specially maintained database, storing the credentials of the application (basic authentication), or a third-party service that checks a given identity against its own trusted store (third-party authentication).