The answer is "authorization".
Authorization is the capacity of indicating access rights/benefits to assets concerning data security and PC security in general and to get to control in particular. All the more formally, "to approve/authorize" is to characterize an access strategy. For instance, HR staff is regularly approved to get to worker records and this approach is normally formalized as access control rules in a PC framework. During this task, the framework utilizes subject's identity for authorization.