"Within this environment, researchers need to control and monitor access to resources, including information and data, research tools and services, often across different institutions where different security systems apply." . . . . .