Once a user's identity has been authenticated, any authorized data access/change privileges are for that user should continue throughout a work session.
Additional Information:
If an identified user is required to take separate actions to authenticate data handling transactions, such as accessing particularly sensitive files or issuing particular commands, the efficiency of system operations may be degraded. Where continuous verification of user identity seems required for data protection, some automatic means of identification might be employed for that purpose.