The credentials may also include a variety of information regarding the type of privileges to be granted to the user (e.g., broad or specific), restrictions on which terminals will honor the credentials, data identifying the user, and other information that is pertinent for authenticating or authorizing a user.