An authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism.