Abstract: Methods, system, computer program products and data structures are described to allow a client to be identified using a plurality of methods during the process of accessing Internet resources through a Proxy or Firewall device. The resultant plurality of methods combines to result in a specific user identification process via multiple data stores. These independent data stores are then quarried to identify a user via a network access process that would not commonly respond to a specific authentication process. A single aggregate data store of user identification information is created to facilitate a more effective search process.