Understanding IAM: Authentication Essentials Explained