Results from the WOW.Com Content Network
Manage your AOL username. Learn how to manage your AOL username. Your AOL username is the unique identity that gives you access to services like AOL Mail or premium services. For AOL email addresses, your username is the first part of the email address before the @ symbol. For non-AOL email addresses, your username is the entire email address.
The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can access. The password file maps textual user names to UIDs. UIDs are stored in the inodes of the Unix file system, running processes, tar archives, and the now-obsolete Network Information Service.
A user profile is a collection of settings and information associated with a user. It contains critical information that is used to identify an individual, such as their name, age, portrait photograph and individual characteristics such as knowledge or expertise. 
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor.
Credential. A credential is a piece of any document that details a qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so. Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification ...
A Microsoft account or MSA  (previously known as Microsoft Passport,  .NET Passport, and Windows Live ID) is a single sign-on Microsoft user account for Microsoft customers to log in to Microsoft services (like Outlook.com ), devices running on one of Microsoft's current operating systems (e.g. Microsoft Windows computers and tablets, …
The process of identity correlation validates that individuals only have account login IDs for the appropriate systems and applications a user should have access to according to the organization's business policies, access control policies and various application requirements.