Some applications can operate in the presence of anonymous authentication, which essentially allows applications to know that authentication occurred, often with some additional non-identifying information about the user, but not to recognize the user's unique identity. Usually this is a qualified "not", since IP addresses, browser fingerprinting, or other information can be used to correlate, but this usually only works for "imperfect" correlation. Good enough for ads and data mining, but usually not enough for real security.

Most applications need some form of persistent user identification (persistent meaning not limited to one session with the application, and usually lasting for an extended number of sessions). There are a number of useful properties one can use to discuss and contrast different identifiers:

Aside from a taxonomy: