. . . . . . "As a result, a network can apply multiple levels of network access to a client or user based on whether the client or user succeeds in one, all, or multiple authentication processes." .