Identity substitutes, tokens and proxies
When authentication is required, it is often easier (and creates a better user experience) to authenticate something other than the identity itself. This is so common, in fact, that it can take some thought to realize when an authentication verifies an identity and when it verifies something else entirely...