In
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
, logging in (or logging on, signing in, or signing on) is the process by which an individual gains
access
Access may refer to:
Companies and organizations
* ACCESS (Australia), an Australian youth network
* Access (credit card), a former credit card in the United Kingdom
* Access Co., a Japanese software company
* Access International Advisors, a hed ...
to a
computer system
A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as ''programs'', wh ...
or program by
identifying and
authenticating themselves.
Typically,
user credential
A credential is a piece of any document that details a qualification, competence, or authority issued to an individual by a third party with a relevant or ''de facto'' authority or assumed competence to do so.
Examples of credentials include aca ...
s consist of a
username
A user is a person who uses a computer or Computer network, network Service (systems architecture), service.
A user often has a user account and is identified to the system by a username (or user name).
Some software products provide serv ...
and a
password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
. These credentials themselves are sometimes referred to as ''a'' login. Modern secure systems often require a
second factor, such as
email
Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
or
SMS confirmation for extra security.
Social login
Social login is a form of single sign-on using existing information from a social networking service such as Facebook, Twitter or Google Account, Google, to login to a third party website instead of creating a new login account specifically for tha ...
allows a user to use an existing cell phone number, or user credentials from another email or
social networking service
A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interest ...
to sign in or create an account on a new website.
When access is no longer needed, the user can log out, log off, sign out or sign off.
Procedure

Logging in is usually used to enter a specific page, website, platform or application, which trespassers cannot see.
Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site.
Logging out may be performed when the
user takes an action, such as entering an appropriate
command
Command may refer to:
Computing
* Command (computing), a statement in a computer language
* command (Unix), a Unix command
* COMMAND.COM, the default operating system shell and command-line interpreter for DOS
* Command key, a modifier key on A ...
or clicking on an external link. It can also be done implicitly, such as by the user powering off their workstation, closing a
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
window, leaving a website, or not refreshing a website within a defined period.
A login page may have a return
URL
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identi ...
parameter, which specifies where to redirect back after logging in or out. For example, it is
returnto=
on this site.
In the case of websites that use
cookies to track sessions, when the user logs out, session-only cookies from that site will usually be deleted from the user's computer. In addition, the server invalidates any associations with the session, thereby making any session-handle in the user's cookie store useless.
This feature comes in handy if the user is using a
public computer or a computer that is using a
public wireless connection. As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer; instead, one should explicitly log out and wait for confirmation that this request has taken place.
Logging out of a computer, when leaving it, is a common security practice preventing unauthorized users from
tampering with it. Some people choose to have a password-protected
screensaver
A screensaver (or screen saver) is a computer program that blanks the display screen or fills it with moving images or patterns when the computer has been idle for a designated time. The original purpose of screensavers was to prevent phosphor s ...
set to activate after some period of inactivity, thereby requiring the user to re-enter their login credentials to unlock the screensaver and gain access to the system.
Methods of Logging In
They include:
* Image recognition
* Fingerprints scanning
*
eye scan
* passwords (oral or textual input)
History and etymology

The terms "login" and "logon" became common with the
time sharing
In computing, time-sharing is the concurrent sharing of a computing resource among many tasks or users by giving each task or user a small slice of processing time. This quick switch between tasks or users gives the illusion of simultaneous ...
systems of the 1960s and
Bulletin Board System
A bulletin board system (BBS), also called a computer bulletin board service (CBBS), is a computer server running list of BBS software, software that allows users to connect to the system using a terminal program. Once logged in, the user perfor ...
s (BBS) in the 1970s.
Early
home computers and
personal computer
A personal computer, commonly referred to as PC or computer, is a computer designed for individual use. It is typically used for tasks such as Word processor, word processing, web browser, internet browsing, email, multimedia playback, and PC ...
s did not generally require them until
Windows NT
Windows NT is a Proprietary software, proprietary Graphical user interface, graphical operating system produced by Microsoft as part of its Windows product line, the first version of which, Windows NT 3.1, was released on July 27, 1993. Original ...
,
OS/2
OS/2 is a Proprietary software, proprietary computer operating system for x86 and PowerPC based personal computers. It was created and initially developed jointly by IBM and Microsoft, under the leadership of IBM software designer Ed Iacobucci, ...
and
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
in the 1990s.
The term ''login'' comes from the verb ''(to) log in'' and by analogy with the verb ''to clock in''.
Computer systems keep a ''
log'' of users' access to the system. The term "log" comes from the
chip log which was historically used to record distance traveled at sea and was recorded in a
ship's log or
logbook
A logbook (or log book) is a record used to record states, events, or conditions applicable to complex machines or the personnel who operate them. Logbooks are commonly associated with the operation of aircraft, nuclear plants, particle accelera ...
.
To ''sign in'' connotes the same idea but is based on the analogy of manually signing a log book or
visitor's book.
While there is no agreed difference in meaning between the terms ''login'', ''logon'' and ''sign''-''in'', different technical communities tend to prefer one over another – Unix, Novell, Linux, and Apple typically use ''login'', and Apple's
style guide
A style guide is a set of standards for the writing, formatting, and design of documents. A book-length style guide is often called a style manual or a manual of style. A short style guide, typically ranging from several to several dozen page ...
says ''"Users log in to a file server (not log on to)...".''
By contrast, Microsoft's style guides traditionally suggested the opposite and prescribed ''log on'' and ''logon''.
In the past,
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
reserved ''sign-in'' to access the Internet,
["Use log on or log on to... Do not use log in, login", 2004, ''Manual of Style for Technical Publications'', 3rd edition, p. 295, Microsoft.com.] but from
Windows 8
Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was Software release life cycle#Release to manufacturing (RTM), released to manufacturing on August 1, 2012, made available for download via Microsoft ...
onward it has moved to the ''sign-in'' terminology for local authentication.
See also
*
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
*
Credential lag
*
Login session
*
Login spoofing
*
OpenID
OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated by co-operating sites (known as relying parties, or RP) using a third-party identity provi ...
*
Password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
*
Password policy
A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part o ...
*
Personal identification number
A personal identification number (PIN; sometimes RAS syndrome, redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system.
The PIN has been the key to faci ...
*
/var/log/wtmp
References
{{Authority control
Authentication methods
User interfaces
Computer access control