How identification, authentication, and authorization differ

We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.