Introduction
Imagine a building where only certain people can enter and access specific rooms. In computer systems, especially in SCADA systems that control important infrastructure, it is crucial to ensure that only the right users can enter and perform allowed actions. This is where user authentication and authorization come in to protect the system from unauthorized access and misuse.