Bob, A good approach to authenticating the identity of users/machines, etc. for access control purposes. Steve