Identity, Roles & IT Security
Unidentified or Anonymous users
Users without credentials or those choosing to access work-spaces as anonymous will have very limited access to content. They will not be trusted by online systems except where content is safe to be exposed to all, the public or the common clientele, for, such are not easily tracked.
Authenticated or Signed-in Users
Authenticated or signed in users are allocated roles and will have access to content as programmed or owned. For this, a user account and a well defined role are a must for serous online living and work.
Admin and Developer Users
Admin (or administrator) users are IT or domain specialists who create roles and accounts, and assign requisite permissions to such accounts in those roles.
Developers (Write Code...) too who support Admins.
Within all contexts and work space environments, IT security involves the same basic themes of authentication, authorization, identity, trust, confidentiality, integrity and policy management. For systems, programs, applications, apps as conceived and used today, it all (Information and IT security...) begins with stakeholder requirements in multiple phases of technical work - from understanding of concepts, through design and architecture to development and retirement. Link to requirements trawling.