The terminology stems from "zero trusting" the network you're in - just because someone can talk to a system doesn't mean they should be able to do anything; the user (via their user agent) should be forced to prove who they say they are before you trust them and before anything can be carried out.