When a particular user is well-authenticated, it is possible to allow that user to create an identity based on a unique-to-the-system handle, sometimes also called an "avatar"