Identifying someone trying to establish a connection to a computer. During logon procedures, two requests are made from the individual trying to gain access: a preauthorized account (or user) name and a preset password. On a computer system used by more than one individual, the logon procedure identifies the authorized users and the protocols of users’ access time. These logon procedures are meant to uphold system security by managing access to sensitive files and operations. Symantec Security Response. Glossary. [Online, July 15, 2004.] Symantec Security Response Website. http://securityresponse.symantec.com/avcenter/refa.html.